1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
3 years ago
10

The alternative to encapsulating security protocol (esp) is _________.

Computers and Technology
1 answer:
Lina20 [59]3 years ago
8 0
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
You might be interested in
If you want to present slides to fellow students or co-workers, which productivity software should you use to create them?
slamgirl [31]
Microsoft powerpoint? i think thats what this is asking
4 0
3 years ago
Read 2 more answers
You use the Paste Options button labeled ____ if you want the pasted chart not to be linked to the source document and you want
Semenov [28]

Answer:

Keep Source Formatting & Embed Workbook

Explanation:

Source formatting is used to apply the formatting from source document while copying and pasting.

Source is the place where the data is already placed and we want to move it make a copy of it on some other document. So if we don't want to change the formatting of source document, we choose source formatting from the options while pasting.

Embed is used to whenever we don't want to link the formatting with source document.

So,

You use the Paste Options button labeled <u><em>Keep Source Formatting & Embed Workbook</em></u><em> </em>if you want the pasted chart not to be linked to the source document and you want the pasted chart to keep the formatting from the source document.

8 0
2 years ago
Read 2 more answers
E) Point out the errors( if any) and correct them:-
leonid [27]

Explanation:

double e-d/5.6;is wrong it should return to c

5 0
2 years ago
Describe how you would define the relation Brother-in-Law whose tuples have the form (x, y) with x being the brother-in-law of y
damaskus [11]

Answer:

The expression is :

π[cd) + π(g,h) ],[π(e,f)+π(a,b)])

We will use foreign key and primary key

8 0
2 years ago
How to play Drinkopoly game?
professor190 [17]
Answer:
Never heard of that lol
3 0
2 years ago
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • What technique is used to separate the different cell parts?
    15·1 answer
  • Upgrading only the motherboard will give some performance improvement to a computer system. Why would the improvement be limited
    14·1 answer
  • Instead of typing out each co-worker's email address individually, you can use the Office Online People application to create a
    8·2 answers
  • . What is automated testing?
    10·1 answer
  • What are the origins of the parking barrier?
    12·1 answer
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • Compile and Execute a Program
    13·1 answer
  • What are logic gates ?​
    10·2 answers
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!