1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
2 years ago
7

Which type of protocol allows for a secure data transmission using encryption methods?

Computers and Technology
1 answer:
oksano4ka [1.4K]2 years ago
5 0

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

You might be interested in
The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
mamaluj [8]

Answer:

ISO standards

Explanation:

ISO / IEC 14443 is the ISO standard that covers RFID usage by devices.

EPCglobal - Electronics Product Code Global Incorporated is also another international standard that covers RFID. These two standards work together to standardize RFID products produced by manufacturers so that these products can be the same across different markets and manufacturers. Example I can purchase a tag from one manufacturer and a transceiver from another and they would function well together. There are also other standards for RFID but the above two are the biggest and most popular with ISO being the oldest.

4 0
3 years ago
A system administrator needs to create a high-performance SQL server. What type of disk configuration will allow the administrat
Studentka2010 [4]

Answer:

Pass-through disk

Explanation:

Pass-through disk configuration will allow the administrator to connect an offline physical disk that is connected to the host machine to a VM to maximize a VM's performance.

VMs access a physical hard disk by way of a "pass-through disk," a special virtual disk that directly accesses the physical disk if it is made exclusively available to the VM.

A pass-through disk must be offline in the parent partition of the Hyper-V server.

4 0
3 years ago
In the airline industry, frequent flyer programs, ticket kiosks, and e-ticketing are all examples of capabilities that are _____
crimeas [40]

Answer:

valuable; rare

Explanation:

A valuable capability is that which gives a firm some competitive advantage. Core competencies are the operational activities that a company does best. A business’s core competencies are what distinguish it from other rival companies in its industry. While Rare capabilities are capabilities that a small amount of, if any, competitors possess. Those type of capabilities that are costly or impossible to imitate.

from the above explanation we can deduce that the modern technology implementation in the airline industry has made it possible to have valuable ptograms and softwares for carring out several task which are no longer scarce to procure.

7 0
3 years ago
PLZZZZZ HELP!!!!!!!!!!
TiliK225 [7]

I'd say the best option would be B.

7 0
3 years ago
FELLING GENEROUS GIVING AWAY POINTS:)
Liula [17]

Answer:

thanksssssssss

3 0
3 years ago
Other questions:
  • What are some options available when using the Replace feature?
    13·1 answer
  • A/An ___ is a series of instructions or commands that computer follows used to create software
    10·2 answers
  • By placing the chorale melody in the highest voice and using a simple harmonization, bach made it easier for congregation member
    5·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • How to be fluent in computer
    10·2 answers
  • 14. Which of the following information about the ESRT T-teen rating rating is FALSE?
    15·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • What are the peripherals of a computer ​
    12·1 answer
  • THIS IS TIMED PLS HURRY UP
    7·1 answer
  • Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the pr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!