1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
14

What steps are involved in the ssl record protocol transmission?

Computers and Technology
1 answer:
HACTEHA [7]3 years ago
4 0
Below are the steps involved:

1. Fragmentation:<span> Every upper layer message  is fragmented into 2^14 equivalent to </span>16384 bytes or less blocks.
2. Compression: This one is optionally applied and must be lossless. It may not increase content length by more than 1024 bytes.
3. Compute a MAC (Message Authentication Code): For this purpose, a shared secret key has to be used.
4. Encryption: Inclusive of the MAC, the compressed message is encrypted using symmetric encryption. It must not increase the length by 1024 bytes or more.
5. Preparing a heading in the following fields: Major Version (8 bits); Compression Length (16 bits); Minor Version (8 bits); and Content Type (8 bits).








You might be interested in
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
kumpel [21]

Answer:

Make install

Explanation:

In Computer programming, after compiling source code, make install still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem.

In general, the commands that are executed by make install are defined in the Makefile.

5 0
4 years ago
Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
SpyIntel [72]

That is the SATA or data cable. I have built a computer myself and I have also struggled with cables. SATA cables can connect to almost every type of hard drives.


3 0
3 years ago
Which one of following is an example of a formatted number using the Currency option?
scoundrel [369]
C.) $7,778.92 is an example of a formatted number using the Currency option.

$ - is a currency symbol of the United States Dollars
, - is a currency symbol that separates whole numbers into group of 3 digits.
. - is a currency symbol that separates the whole amount from the centavos amount
7 0
4 years ago
Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
lutik1710 [3]

Answer:

I have created and attached an image with example values for this question.

First we'll learn the IF function syntax:

IF(logical_test, value_if_true, [value_if_false])

Where

logical_test is the decision making comparison

value_if_true is the result to return when TRUE

value_if_false is the result to return when FALSE

We assume that cells B10 to G10 contain the Total Sales for January to June. And cells B17 to G17 contain the Commissions for January to June.

a.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;True;False)</em>

<em />

b.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;False)</em>

<em />

c.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;B10*0.27)</em>

<em />

d.

To copy the formula in B17 to C17:G17, you can just copy and paste or select cell B17 and drag from the black square on the bottom right of the cell.

8 0
3 years ago
Read 2 more answers
In Java how do you print ASCII values?
liubo4ka [24]
What are the choices

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program to help you feed your friends at a party by doing some math about square pizzas. Assume the grader defines a str
    12·1 answer
  • Folders are containers used to organize the documents into manageable groups on a designated storage device. true or false
    10·1 answer
  • What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and
    10·1 answer
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • Give examples of two IP addresses (that are 100 IP addresses away from each other but the last octet is not greater than .150) t
    15·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • If a computer truncatesall numbers to two decimal places, compute the error forthe following: 23.345+222.34911)0.12)0.01413)0.14
    15·1 answer
  • A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
    5·2 answers
  • Mention three types of pipeline hazards​
    6·2 answers
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!