1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
7

Which type of protocol allows for a secure data transmission using encryption methods?

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
5 0

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

You might be interested in
If you're able to understand directions more easily when you hear them instead of reading them you are most likely
puteri [66]

Kinesthetic learning

6 0
3 years ago
When a router connects to and communicates over the internet, it has a ________ ip address that is routable over the internet.?
Bond [772]
It is a shared ip address
7 0
3 years ago
Computers automatically name the main hard drive the_____ drive?
telo118 [61]

Answer:

Im not entirely sure but I think this is disk drive

Explanation:

6 0
3 years ago
Jeff has created a table to calculate the cost of raw materials that he purchases monthly. Cell A2 shows the fixed cost of the r
lisabon 2012 [21]

Answer:

the correct answer is A

5 0
3 years ago
Read 2 more answers
Which is used to create a vector image? <br><br> Resolution <br> Pixels <br> Raster data <br> Paths
spayn [35]

Answer:

Paths

Explanation:

Vector graphics are comprised of paths, which are defined by a start and end point, along with other points, curves, and angles along the way. A path can be a line, a square, a triangle, or a curvy shape. These paths can be used to create simple drawings or complex diagrams.

6 0
3 years ago
Other questions:
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • _____ consists of computer equipment used to perform input, processing, and output activities.
    10·1 answer
  • The first time you save a document, which screen appears
    8·2 answers
  • What is the system of phonographic disc recordings paired with a projector called?
    9·1 answer
  • HELP ME PLEASE!!!!!!!!!!!!
    8·2 answers
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • Amy just added a 462 meter run of fiber optic cable to the network what should she do next?
    10·1 answer
  • Joe runs a handyman service. He enjoys writing and keeping up on the latest trends. He wants to share this information with his
    14·1 answer
  • If you play gta and don't know the song ''Glamorous'' Then what do you even do when you play?
    6·2 answers
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!