1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
11

Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely.

Give three specific example pairs of Internet entities that may want secure communication.
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
6 0

Answer: See explanation

Explanation:

A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.

Examples of Internet entities that may want secure communication include:

i. Two routers

ii. Our laptop and web server.

iii. Connection that exists between two DNS name servers.

You might be interested in
Question 11 of 20
horrorfan [7]

The type of tool would best serve a project manager whose team needs to share many different types of documents are d. timelines.

<h3>What are the timelines?</h3>

A mission timeline outlines the mission activities so as in their occurrence. It captures precisely what wishes to be finished over the path of the mission lifecycle and the way it will likely be finished.

The mission control timeline is an in-depth agenda on your mission. It spells out all the duties concerned and a closing date for every in order that your complete group can see whilst man or woman steps will take area and whilst the entire mission could be wrapped up.

Read more bout the project manager:

brainly.com/question/6500846

#SPJ1

8 0
2 years ago
Which of the following is not an acceptable way to code a nested structure? Select one: a. nest a for loop inside a while loop b
kirill115 [55]

Answer:

nest an else clause within an elif clause

Explanation:

in python Programming, we cannot nest an else clause within an elif clause. elif is actually else if condition. we cannot nest another else with in elif clause.

8 0
3 years ago
Which of the following is an advantage to using internal databases for​ information? A. Internal information is accurate and com
Irina-Kira [14]

Answer:

C. They can be accessed quickly and cheaply.

Explanation:

An internal database is information that can be obtained inside the company through internal networks. This information can be easy to get as it is in the network of the company and you have access to it and it also have a low cost as you don't have pay money to get it. According to this, the answer is that an advantage to using internal databases for​ information is that they can be accessed quickly and cheaply.

The other options are not right because internal information can be  outdated and incomplete if it is not updated by people in the company and it can be found in different forms and it is not always easy to manage as this depends on the applications used and how the company decides to visualize it.

3 0
3 years ago
BitTorrent is software that is commonly used to share audio and video files and documents over the Internet. These files are loc
bearhunter [10]
Router, just know the internet is bunch of routers communicating with each other so the answer is a router
7 0
3 years ago
Which payment type is best if you are trying to stick to a budget?
gavmur [86]
Debit is the best payment type
3 0
3 years ago
Other questions:
  • Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without t
    11·1 answer
  • The best way to access the Windows Help and Support Center is _____.
    10·1 answer
  • Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
    7·1 answer
  • Viruses and worms can affect a system by:
    11·2 answers
  • Hubs connect network hosts in which configuration?
    7·1 answer
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • What is the grade, as a percentage with two digits after the decimal point, obtained when you graded this 101-question multiple-
    13·1 answer
  • with the aid of your own example explain how memory,registers and secondary storage all work together​
    8·1 answer
  • Please help! Python programming, use the factorial operation to evaluate 4!. Answers are in picture please pick one, thank you.
    15·1 answer
  • What was the name of the first computer, developed by charles babbage?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!