1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
4 years ago
10

The alternative to encapsulating security protocol (esp) is _________.

Computers and Technology
1 answer:
Lina20 [59]4 years ago
8 0
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
You might be interested in
For the question below, refer to the following recursive factorial method.
Mashcka [7]

Answer:

(d) 6

Explanation:

When we call factorial(3) first it will check if it greater than 1 since it is greater then return 3*factorial(2) will be called on factorial(2) it will again check that 2>1 since it is greater then return 2*factorial(1) will be called.In factorial(1) we have is not greater than 1 so it will return 1.return 2*factorial(1) will return 2 and 2 that is returned by factorial(2) will be multiplied with 3.So it will return 6.

8 0
4 years ago
What does ""fair use"" mean regarding copyrighted works?
Nady [450]

In regards copyrighted works, fair use is simply known as legal dogma that allows the right to free expression by allowing the unlicensed use of copyright-protected works by individuals as regards to some certain situations.

Fair Use of copying of copyrighted material can only be used in a short and revelatory us, example to criticize, or caricature of a copyrighted work. It is often known to be a legal defense that protects individuals of copyrighted material from copyright infringement.

  • Fair use allows a person/people to use a copyrighted work without acknowledgement or permission of copyright owner and it can be used  to criticize, comment, news reporting, teaching, research etc. It is not seen as infringement under the law.

Conclusively, we can say that In regards copyrighted works, fair use is simply known as legal dogma that allows the right to free expression by allowing the unlicensed use of copyright-protected works by individuals as regards to some certain situations.

Learn more from:

brainly.com/question/1534807

5 0
2 years ago
If your laptop is not able to connect to your wireless network, which of the
krok68 [10]
The answer is A! Hope this is helpful!
8 0
2 years ago
Read 2 more answers
The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate secur
maks197457 [2]

Answer:swswsw

Explanation:swwsws

4 0
3 years ago
The set of communications rules for exchanging information electronically on the internet is called the ________.
MA_775_DIABLO [31]
The set of communications rules for exchanging information electronically on the internet is called the URL. URL stands for Uniform Resource Locator. It consists of <span>Protocol identifier that indicates the name of the protocol that is used (for example: http) and  </span>Resource name is the <span>complete address to the resource. brainly.com.</span>
4 0
4 years ago
Other questions:
  • On an Android device, where can a user find the correct app to use to sync contacts and apps among devices?
    10·1 answer
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
    14·2 answers
  • What kind of fragment is near the computer?
    14·1 answer
  • Factors of production are A. inputs into the production process. B. social and political conditions that affect production. C. t
    7·1 answer
  • Phillip wants to create a new Google Display Ad campaign and base his targeting on an existing remarketing list named Checkout A
    10·1 answer
  • When someone makes a bad or immoral decision because a group of their friends is also doing it, it is called:
    10·1 answer
  • PLEASE HELP! 2D Animation!
    12·1 answer
  • Pick all the correct answers
    5·1 answer
  • HELPPP
    5·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!