1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute

r and networking technologies. These documents are published by the Internet Engineering Task Force, the standards body for Internet engineering specifications. RFCs exist for hardware, operating systems, protocols, security services, and much more. It is an older protocol largely replaced by IPSec and SSL/ TLS-based VPNs in production environments, but it is still in use in some older environments. It is an early proprietary protocol from Microsoft. It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.
Computers and Technology
1 answer:
mr_godi [17]3 years ago
3 0

Answer:

It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

Explanation:

The characteristic relates to authentication header (AH) is that it is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

You might be interested in
The sum of the deviations of each data value from this measure of central location will always be zero. A. Median B. Standard de
JulijaS [17]

Answer:

C. Mean

Explanation:

Mean = (∑x_{i})/N

Median = central values when data is sorted

Mode = most repeated value

Standard deviation = \sqrt{sum(x_{i}-mean)^{2}/N}

In standard deviation, formula you may see that deviation is being calculated from the mean (central location). But here we take square of the value before adding all of them.

But if we just take sum(x - mean), it would be equal to zero.

<u>EXAMPLE</u>

Take 4, 9, 5 as data

mean = (4+9+5)/3 = 18/3 = 6

sum of deviations from mean = (4-6)+(9-6)+(5-6) = (-2)+(3)+(-1) = 0

8 0
3 years ago
Read 2 more answers
Consider the following recursive method: public int someFun(int n) { if (n &lt;= 0) return 2; else return someFun(n-1) * someFun
Stella [2.4K]

Answer:

(a) someFunc(3) will be called 4 times.

(b) For non negative number n someFunc method calculates 2^2^n.

Explanation:

When you call someFunc(5) it will call someFunc(4) two time.

So now we have two someFunc(4) now each someFunc(4) will call someFunc(3) two times.Hence the call to someFun(3) is 4 times.

someFunc(n) calculates someFunc(n-1) two times and calculates it's product.

someFunc(n) = someFunc(n-1)^2..........(1)

someFunc(n-1)=someFunc(n-2)^2..........(2)

substituting the value form eq2 to eq 1.

someFunc(n)=someFunc(n-2)^2^2

       .

       .

       .

       .

= someFunc(n-n)^2^n.

=2^2^n

2 raised to the power 2 raised to the power n.

3 0
3 years ago
In which of the following scenarios would you choose to embed versus import data?
Mrrafil [7]

Answer:

B.)You want to maintain connections with external files

Explanation:

These are the options for the question

A.)You do not want to save the original data sources.

B.)You want to maintain connections with external files

C.)You want to reduce file size

Embedding data can be regarded as insertion of objects( embedded object) such as spreadsheet into a word-processor so that it can be edditted.

Data Import can be regarded as ways that give room for uploading of data

from external sources , then combine it with data that is been collected via Analytics.

6 0
3 years ago
Roger is part of a team that is responsible for employing a new information system, the design of which was developed using cust
antoniya [11.8K]

Answer:

A line with a diamond on one end

Explanation:

A line with a diamond on one end is used as a symbol for condition.

In a structured programming chart, condition represents the fact that one program module (a control module) determines subordinate modules that will be invoked.

5 0
3 years ago
What makes a computer a computer?​
MrMuchimi

Answer:

A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    7·1 answer
  • Float in is an example of a(n) _____. annotation, evolution, animation, simulation
    14·1 answer
  • In this activity, you'll decide how a computer (in this case, a smartphone)
    12·1 answer
  • A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 servings in the bag and that a se
    10·1 answer
  • A network address is 131.247.160.0/19. The 19 implies that
    5·1 answer
  • Which of the following conditions will maximize the amount of interest you earn
    5·1 answer
  • PLEASE HELP I WILL GIVE YOU BRAINLILY
    15·2 answers
  • They will wash the car change into tag question​
    6·1 answer
  • Explain the working principal of computer system with suitable diagarm​
    10·2 answers
  • Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!