1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
5

Web storage stores data in the browser in

Computers and Technology
1 answer:
Andrew [12]3 years ago
6 0

Answer:

session.

Explanation:

Web storage stores data in the browser in sessions.There are two types of web storage APIs available local storage and session storage.Both of these storages are used to store data on client side.While session stores data in key/value pairs which consists of strings.The maximum Limit of data storage is about 5MB.

You might be interested in
1. Who was able to complete the puzzle the fastest in Trial 1?
KATRIN_1 [288]

Answer:

You...answered all of the questions.

Explanation:

All of them have a response!

8 0
2 years ago
A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service
Softa [21]

Answer:

A. S/MIME

B. TLS

C. Kerberos

Explanation:

PKI : Public Key Infrastructure is a technique which will allow services or applications to communicate securely across the unsecured network or internet.

PKI mainly consist of CA or Certificate Authority who can issue digital certificates or they are also known as trusted CA.  exmaples are godaddy, digicert, verizone, symmantec, etc.. and RA also known as Registration Authorities and they verify if the requested certificates can be stored at CA. Keys will be stored in the central directory.It will also consists of certificate management system and the policies governing PKI.

S/MIME : Secure/Multipurpose Internet Mail Extensions which use assymentric cryptography and sign the MIME data.   S/MIME will provide services like  Authentication, Encryption , Integrity, Privacy and Non repudiation for messaging applications

SMIME uses certificates which can be self signed or CA certified. It specifies MIME type as  application/pkcs7-mime  while transmitting the data.

TLS : Transport Layer Security. the earlier versions used to be known as SSL ( Secure Socket Layer) SSLv3 got depreciated and TLSv1.2/1.3 are popularly used to provide encryption, authentication, Integrity and Hashing for client to server side communication.

Most of the applications communicate securely using TLS.  They will establish secure TCP connection using SSL Handshake. During the Handshake they will exchange supported versions, ciphersuites and certificates. Applications which uses TLS always uses CA certificates and Inhouse applications can communicate using self signed certificate or even with CA certificates.

HTTPS which is also known as HTTP over SSL is widely used for almost all the web services to communicate securely across the internet.

Kerberos : It is a protocol used to prove the identity for two nodes which are communicating with each other. Kerberos uses both symmetric key cryptography and assymetric key cryptography. However, symmetric key cryptography is used widely and public key cryptography is used optionally.

Authentication server which is also known as AS is used to authenticate the requesting client.  It further forwards the user credentials to key distribution center. KDC further issues to TGT ( ticket granting ticket) and it uses TGS's secret key to encrypt. User will receive a encrypted output.  

When a User Login then The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. Sessions will be renewed and managed by users session manager.

4 0
3 years ago
Use the drop-down menus to complete the statements about using column breaks in word 2016
Ugo [173]

Answer: layout, section, number, more options

Explanation:

Just did it on edge 2020

4 0
3 years ago
Read 2 more answers
Keep a log of the different types of communication activities in which you engage during the rest of the day. Categorize each ac
baherus [9]

There are 4 different types of communication and I can share my experience by helping you out to solve the assignment.

Explanation:

1. Verbal Communication:

  • Communication with voice
  • Provides active listening
  • Body language is equally important.

2. Non-Verbal:

  • Body language is the most important
  • Communicating without using the words

3. Visual communication:

  • Listening contents through photos and videos

4. Written communication:

  • Serves as record
  • Does not require tone

So in day today aspect we come across almost all type of communication. To answer the discussed question

1. Did the variety of communication surprised you?

I would say yes. I can say unknowingly I have experienced various types.

2. Did you find that your were more involved in one type of communication?

I would say yes. People may like communication type depending on their interest and skill set. So according to me even I have involved in my life with one set of communication and I am trying to use it more.

3. Which one(s) is/are most involved?

So it differs from people to people. I like verbal communication, because I am good at speaking with good tone and voice. Also, I am attracted towards visual communication because one picture will talk more than what an essay would communicate.

6 0
3 years ago
...........is a systems development technique that tests system concepts and provides an opportunity to examine input, output, a
EleoNora [17]

Answer:Prototyping

Explanation:Prototyping is the software activity in which there is the production of the prototypes which has the incomplete form of application .It is used for the development of the real-world operating system and used in the field of the software development. It provides the benefit to the user by examining about the product's reliability , output, input etc .

3 0
3 years ago
Other questions:
  • WHICH OF THE FOLLOWING LOOKS JUST LIKE A CD ROM BUT CAN STORE MUCH MORE INFORMATION
    8·2 answers
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Which increases the rate of soil formation?
    10·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • You work for a company that does network cable installations. Your company has been contracted to pull out the existing CAT 3 wi
    11·1 answer
  • A service technician removed the inspection/fill plug from the differential of a rear-wheel- drive vehicle and gear lube started
    8·1 answer
  • Your sister asks you if it is possible to get an office productivity suite for free. What do you tell her?
    13·1 answer
  • 14. Which of the following is NOT likely to be one of the future development gaming industry?
    7·1 answer
  • Write a Scientific report modeling a written reasearch paper on big data applications.​
    6·1 answer
  • A Consider the following method definition. The method printAllCharacters is intended to print out every character in str, start
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!