1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
2 years ago
7

Which type of protocol allows for a secure data transmission using encryption methods?

Computers and Technology
1 answer:
oksano4ka [1.4K]2 years ago
5 0

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

You might be interested in
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet a
AveGali [126]

Answer:

Adware is the correct answer to the given question.

Explanation:

Adware is a type of software that turns a profit for its creator by creating online advertising in the software's user interface automatically. The Adware  giving the advertisement in the website or in the web page. There are two different ways in which Adware is going on the computer  

1 Malicious website    

2 Shareware.

Adware software is used to purporting to serve some useful function adware software display the advertisements without the consent of the computer user or machine.

3 0
3 years ago
To create a cover letter to send to potential employers along with a resume, what software program should you use ?
UkoKoshka [18]
I personally would use Word because it has the potential to create the cover letter and attach a resume along with it. 

Excel is more for tables and creating an organized way to see your recordings. 

PowerPoint is known for presentations mainly.

Twitter is a type of social media platform that is useful in communication. 
4 0
2 years ago
Read 2 more answers
To create a new folder, press ____.
finlep [7]
Hey There!

To create a new folder, press <span>Ctrl+Shift+N</span><span>

</span>
5 0
2 years ago
What natural resources fueled industrialization in the united states?
hichkok12 [17]

Natural Resources that fueled American Industrialization

 

<span>1. Iron ore: Used to create steel and pig iron.  Used for railroad ties, bridges, buildings.</span>

 

2. Coal: with the invention of the steam engine, coal replaced wood in fueling the steam engine and machinery used in various industries such as the steel industry.

 

<span>3. Oil: The ability to use a steam engine for oil drilling started an oil boom in the United States.  It helped with the creation of a Petroleum-refining industry.  Transformed oil into Kerosene and later gasoline for the automobile</span>

 

Lumber: Used to fuel the steam engines that were used on trains, steamboats, and in industry for the new machines being invented that ran on steam.

<span> </span>

5 0
3 years ago
Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
patriot [66]

Answer:

Pre-order: Kirk, Chekov, Khaaaan, Spock, Scotty, McCoy, Sulu, Uhuru

In-order: Chekov, Khaaaan, Kirk, McCoy, Scotty, Spock, Sulu, Uhuru

Post-order: Khaaaan, Chekov, McCoy, Scotty, Sulu, Uhuru, Spock, Kirk

Explanation:

The binary search tree is described in the diagram below.

The pre-order traversal of the binary tree gets the root, then the left node and right node. The in-order traversal picks the left node, the root node, and then the right node while the post-order traversal of the binary tree follows the left node, right node, and then the root node.

6 0
2 years ago
Other questions:
  • What is the type of account and normal balance of allowance for uncollectible accounts?
    13·2 answers
  • By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather t
    14·1 answer
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • What is a googleplex?
    7·1 answer
  • Briefly summarize two examples of cybercrime stories.<br> quick pleaseeee
    10·1 answer
  • What is the traditional cognitive perspective ofHCL?
    12·1 answer
  • Your friend's job pays $5.00 per hour, and he works 20 hours per week. His tax rate is 20 percent. Assuming he works 50 weeks of
    11·2 answers
  • What is the Role of an algorithm?
    11·1 answer
  • Hiiiiiiiiiiiiiiiiii <br>i'm new here!!!​
    14·2 answers
  • Which version of java should i use?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!