1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
7

Which type of protocol allows for a secure data transmission using encryption methods?

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
5 0

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

You might be interested in
Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words the
andriy [413]
Text = “ I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl.

word = ‘owl’
texts = text.lower()
owlist = list(texts.split())
count = text.count(word)
num = [owlist, count] #num has no meaning just random var
print(num)


Alter in anyway you want so that you can succeed. ✌
4 0
3 years ago
Answer the questions given below, share your ideas.Use the space for your answer.
Bess [88]

Answer:

I would get rid of the machine and well

8 0
2 years ago
Atieno is a musician who records music on her computer. Which devices do you think she would need the most?
AURORKA [14]

Answer:

Midi Synthesizer, Mic,Boom Mic, Laptop

Explanation:

At the end of the day a keyboard and a pc is all you need as the keyboard alone can cover nearly any instrument.

8 0
3 years ago
You are helping a friend in college with his network connection. He would like a high speed connection between his computers so
inna [77]

Solution :

Set up the router as follows:

On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet $100/1000TX$ router with the firewall to the Workspace.

Connection of the router as follows:

Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a $LAN$ port on the router. Above the Dorm-$PC2$ computer, select $\text{back}$ to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e $RJ45$ cable. In the Selected Component window, drag the connector to the $LAN$ port on the computer. In the Selected Component window, drag the other connector to a $LAN$ port on the router. Select a Cat5e $RJ45$ cable. In the Selected Component window, drag a connector to the $WAN$ port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.

Provide power to the router as follows:

On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.

Request new $TCP/IP$ information from the router for Dorm-PC as follows:

On the $\text{Dorm-PC}$ monitor, select Click to view $\text{Windows 10}$.In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter $\text{ipconfig}$ /renew and press $\text{Enter}$ to request new $TCP/IP$ information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.

Configure Windows Firewall on $\text{Dorm-PC}$ as follows:

In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.

4 0
3 years ago
Blender questions
Tamiku [17]
<span>14. A mesh represents a(n) _____ object if its faces enclose a positive and finite amount of space. (1 point)

odd

connected

simple

convex



15. Which of the following is the 3-D view port? (1 point)

the standard layout used for new files

the polygon viewing on the default screen

straight line segments connecting two vertices

a single static image in 3-D

The answer for number 1, should be:
SOLID
</span><span>A mesh represents a solid object if its faces enclose a positive and finite amount of space
</span>
The answer for the second question is:
a single static image in 3-D
4 0
3 years ago
Read 2 more answers
Other questions:
  • In the Happy Valley School System, children are classified by age as follows: less than 2, ineligible 2, toddler 3-5, early chil
    6·1 answer
  • Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm
    11·1 answer
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • The item in this illustration that is highlighted is _____.
    11·2 answers
  • Who's YouTube creator?
    10·2 answers
  • Describe how you would define the relation Brother-in-Law whose tuples have the form (x, y) with x being the brother-in-law of y
    9·1 answer
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
    11·1 answer
  • Write a SELECT statement that returns a single value that represents the sum of the largest unpaid invoices submitted by each ve
    5·1 answer
  • 10. Differentiate between equity share &amp; preference share.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!