1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
14

Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?

Computers and Technology
1 answer:
ale4655 [162]3 years ago
3 0

Answer:

B is more probable option than C

Explanation:

I think its both B and C

You might be interested in
Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attacker
Aloiza [94]

The cybersecurity objective that the above attack violate is known as Integrity.

<h3>What is Cybersecurity aims?</h3>

Their objectives is majorly to protect any computers system, networks, and other kinds of software programs from any type of cyber attacks.

Note that The cybersecurity objective that the above attack violate is known as Integrity as they are not the kind of people that keep to their words.

Learn more about cybersecurity from

brainly.com/question/12010892

#SPJ1

3 0
2 years ago
What are the external parts of a computer system and which are output devices and which are input devices
cestrela7 [59]
I'd question the wording, However:

Monitor, Output device.
Keyboard, Input device.
Mouse, Input device.
Speakers Output Device.
Microphone, Input device.
Printer, Output device.
Scanner, input device.

Devices do not have to explicitly be one or the other e.g. a printer with a scanner, or headphones with a microphone.  
4 0
4 years ago
What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?
N76 [4]

Answer:

1001011_2    +   100011_2   =    6E_{hex}

Explanation:

Required

1001011_2 + 100011_2 = []_{16}

First, carry out the addition in binary

1001011_2    +   100011_2   =    1101110_2

The step is as follows (start adding from right to left):

1 + 1 = 10 --- Write 0 carry 1

1 + 1 + 1(carry) = 11 ---- Write 1 carry 1

0 + 0 + 1(carry) = 1 ---- Write 1

1 + 0 = 1 --- Write 1

0 + 0 = 0 ---- Write 0

0 + 0 = 0 ---- Write 0

1 + 1 = 10 --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

1001011_2    +   100011_2   =    1101110_2

Next, convert 1101110_2 to base 10 using product rule

1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0

1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0

1101110_2 = 110_{10}

Lastly, convert 110_{10} to hexadecimal using division and remainder rule

110/16 \to 6\ R\ 14

6/16 \to 0\ R\ 6

Write the remainder from bottom to top;

110_{10} = 6(14)_{hex}

In hexadecimal

14 \to E

So, we have:

110_{10} = 6E_{hex}

Hence:

1001011_2    +   100011_2   =    6E_{hex}

3 0
3 years ago
How can structure of a table change in sql. What general types of changes are possible.
frez [133]

One can structure of a table change in sql and the general types of changes that are possible is that:

  • One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.
  • One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

<h3>How can we modify the structure of a table in SQL?</h3>

The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.

Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.

Hence, One can structure of a table change in sql and the general types of changes that are possible is that:

  • One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.
  • One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

Learn more about table structure from

brainly.com/question/26125587

#SPJ1

3 0
2 years ago
Articles are written using the third person point of viewtrue or false
AysviL [449]
The answer is true. Hope this helps.
4 0
3 years ago
Other questions:
  • You can select a paragraph y using the ____key.
    10·1 answer
  • What is a Windows feature that allows you to temporarily store text?
    5·1 answer
  • WHAT DOES THE WORD MONOCHROME MEAN?
    11·1 answer
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • reading is important blank areas of life A in very few B in many C only in academic D only in career​
    10·1 answer
  • Can someone please join my tournament on Zombs Royale if u win u can win 30,000 dollars all u have to do is go to Zombs Royale t
    15·1 answer
  • 20121_GRPS_ELECTIVE_Computer Applications - Office 2016_A_IC
    8·2 answers
  • I really need this answer please
    5·1 answer
  • Discuss how the Internet has made our communication hypertextual, omnidirectional, and more interactive
    6·1 answer
  • Which two devices are paired to create a memory cell? what term is used to describe this common form of computer memory? (2 poin
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!