1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
3 years ago
15

can someone please define these three vocabulary words for my stem class i will give brainliest if i can figure out how

Engineering
1 answer:
Alexus [3.1K]3 years ago
4 0
Just use g-00gle lol
You might be interested in
Most deformation occurs along plate boundaries because ________.
Svetlanka [38]
B) the plates are in constant motion and as a result the boundaries are where they interact
3 0
4 years ago
A 15-kg iron block initially at 280°C is quenched in an insulated tank that contains 100 kg of water at 18? Assuming the water t
Serhud [2]

Answer:

Explanation: Reverse card.

3 0
4 years ago
SSL/TLS is used for ________.
Nana76 [90]

Answer:

1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications

2.Small malware programs that download larger malware programs are called downloaders

3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards

4. Converting application messages into bits is called encoding

5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements

6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim

7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION

8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE

9. Firewall log files should be read EVERYDAY

10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file

11. IT security employees are the most difficult employees

12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.

13. In a firewall, VPN traversal reduces firewall filtering effectiveness

14. DIRECTLY-PROPAGATING WORM can spread more rapidly

15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.

16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.

17. 802.11 data link layer standards govern neither access point operation nor frame organization

18. Credit card number thieves are called CARDERS

19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY

20. Iris scanning is attractive because of its PRECISION

21. The source socket is 60.171.18.22:57707. The source is a CLIENT

4 0
4 years ago
Using an "AND" and an "OR", list all information (Equipment Number, Equipment Type, Seat Capacity, Fuel Capacity, and Miles per
Tomtit [17]

Answer:

Explanation :

The given  information to be listed can are Equipment Number, Equipment Type, Seat Capacity, Fuel Capacity, and Miles per Gallon.

Check the attached document for the solution.

5 0
3 years ago
When one vessel is overtaking
elena-s [515]

Answer:

Explanation:

The question is asking when one boat is overtaking another boat, the overtaking boat should steer around the slower boat. The slower boat, the vessel being overtaken, is the stand-on vessel.

5 0
3 years ago
Other questions:
  • A stream of vinyl chloride monomer (VCM, H2C=CHCl, molecular weight = 62.5lb/lb-mol) in air is being produced from a process to
    7·1 answer
  • Detectives find two substances at a crime scene. One is a poison, and the other
    13·1 answer
  • Double colon operator: Increment by x Construct a row array countValues from 0 to 25, elements incremented by incrementValue. Ex
    11·1 answer
  • There are four distinct events that occur in the Carnot cycle. Name the events and describe each one.
    15·1 answer
  • How do I put a picture on here for my graph equation??
    10·2 answers
  • Methane (chemical formula Ch4), an important greenhouse gas, has a nearly constant mixing ratio throughout the lower atmosphere
    5·1 answer
  • Create a plot of the force of static friction, fsfsf_s, versus the x component of the pulling force, FxFxF_x, for the experiment
    10·1 answer
  • While discussing PCM monitor tests: Technician A says that some monitors only run after another monitor completes. Technician B
    10·1 answer
  • م
    12·1 answer
  • What are two ways you can see that there is a smaller load going to the base of the transistor?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!