Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer 1

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.


Related Questions

2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD. ​

Answers

Answer:

Cccccccccccccccccccccccccccccccccc

Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis

Answers

Since Ned is trying to decide how he wants to connect the nodes on the network he created, the  two options that he has are option b and C:

b. Through hard cabling or wireless radio waves.

c. Through ethernet cables or Bluetooth.

What kind of cable does a computer system typically use to connect to a network?

A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.

Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.

Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.

Learn more about ethernet from

https://brainly.com/question/28156384
#SPJ1

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:


What is the difference between hacking and cracking

Answers

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

Can you recommend me a movie? ​

Answers

Ice age definitely……….

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Answers

Answer:

The correct answer will be "Semi-structured data".

Explanation:

Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.

So that the given scenario is the example of semi-structured data.

How a student can use computer to improve academic performance?

Answers

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

Answer:

A student can use it by searching up things with his/her computer.

Browse for different new things everyday that gives knowledge.

Ask questions.

Do new things everyday.

A computer can easily input grades and send data.

Explanation:

Okay.

Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective

Answers

the board if not try a restart a couple more times and we see what happens from there

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a

Answers

Answer:

A reverse proxy.

Explanation:

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.

In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.

Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher

Answers

Answer:

The file extensions of files created with Microsoft Office Access is .adb for Access project

The file extension of files created with Microsoft publisher is .pub

Explanation:

The file extensions of files created with Microsoft Office Access are;

.adp = Access project

.adn = Access blank project template

.accdb= Access database for 2007, 2010, 2013, and 2016 versions

Other file extensions include

laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf

The file extension of files created with Microsoft publisher is the .pub

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

j. A computer on a network that acts as the central storage location for

programs and data used on the network

Answers

Answer:

Una unidad central (en inglés mainframe) es una computadora grande, potente y costosa, usada principalmente por una gran compañía para el procesamiento ...

Explanation:

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user's virtualized desktop. Which type of deployment model is being used

Answers

The type of deployment model that is used is referred to as Thin client.

A thin client is also referred to as lean client. It is a model that runs on the resources that are stored on a central server rather than in the resources if the computer.

A thin client is useful for shared services, and desktop virtualization. The work carried out by the server include storage of data, performing if calculation, launching software programs etc.

On conclusion, since the information given in the question explains that there's a remote connection to the data center to run the user's virtualized desktop, then the deployment model is a thin client.

Read related question on:

https://brainly.com/question/13934016

Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)

A. tools
B. information
C. capital
D. people
E. power

Answers

I think the answer would be tools cause that what Ron would use. The answer is tools

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

what's the answer to this​

Answers

Answer:

S

Explanation:

The index operator will address individual characters in the string.

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps

Answers

Answer:

The answer to this question can be defined as follows:

In option 1, the answer is "18.75%".

In option 2, the answer is "33%".

Explanation:

Given:

JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21  

JOB 2-Time of the CPU = 5ms, rest = 24ms, sum  = 29    

JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14  

In option 1:

whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.  

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]

                              [tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]

In option 2:

However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]

learn to accept your mistakes even when you have done your ​

Answers

Answer:

besttttttttttttttttttttttt

Answer: done your best :)

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

What steps are needed for word to create an index

Answers

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

Answer:

Position the insertion pointer where you want the index to appear.

(the insertion point is the point where the next characters typed from the keyboard will appear)

If you want the index to start on a new page, create a new page in the program you're using

Then you click the References tab.

In the Index group, click the Insert Index button.

When the Index dialog box appears, click the OK button to insert the index into your document.

Other Questions
3,125 subtracted by what can give me 514 Farah is x years old. Ibtisam is 3 years younger than Farah. Muna is twice as old as Ibtisam. Write and expression in terms of x, for (a) Ibtisam's age, (b) The sum of their three ages, giving your answer in its simplest form. 1. a number b divided by thirty-six (08.01) Two lines, A and B, are represented by the following equations: Line A: y = x 1 Line B: y = 3x + 11 Which of the following options shows the solution to the system of equations and explains why? (3, 2), because the point does not lie on any axis (3, 2), because one of the lines passes through this point (3, 2), because the point lies between the two axes (3, 2), because both lines pass through this point Help pls will give brainliest Match the increase in demand for natural resources to the causes. 1.four-wheeled automobiles 2.heating homes 3.textile factoriesA. increase in demand for coalB. increase in demand for cottonC. increase in demand for oil A customer owns a long-term negotiable CD. If the customer wishes to tender the CD prior to maturity, the registered representative should inform the customer that: Four letters are selected at random with replacement from the word MATHCOUNTS. What is the probability that the letters in the order they are selected will form the word MATH? five fold health hazards prevalent in Nepal Why did Congress agree to the Missouri Compromise?O A. To decide what states would join the UnionO B. All of theseO c. To address the conflict over slaveryO D. To get settlers to move into the territory Question is in the pic I really suck at this stuff can I get some help plssssss Help question 25 pleasee Please answer this correctly without making mistakes In a fish tank, 1/5 of the fish are guppies and 1/12 of the fish are goldfish. Which equation most closely estimates the fraction of the fish that are guppies or goldfish in the tank.suggested answers: 1/2+1/2=1 , 1/2+1/4=3/4 , 1/4+1/4=1/2, 1/4+0= 1/4 Why do you think it is important to keep historical time? Check all that apply. to learn about events from the past to know when certain events happened to understand how events affect one another to see connections between historical events summer school is over, and I'm feeling self-destructive. Take all of my points and have a good night. 2/3 1.3 is 10% of what number A balloon artist creates balloon hats for children at a stores grand opening. The graph shows the number of balloons the artist has remaining, y, after creating x hats.A coordinate plane showing Balloon Hat Creations. The x-axis shows Number of Balloon Hats and the y-axis shows Balloons Remaining. The straight line starts at (0. 500) and continues down and to the right through points, (50, 250) and ends at (100, 0).What phrases can be used to describe the line representing the relationship between the number of balloons remaining and the number of hats created? Select three options.positive slopenegative slopeconstant slopeincreasing functiondecreasing function Triangle LMN is dilated by a scale factor of 2/3 to form triangle LMN. Side NL measures 48. What is the measure of side NL? Convert 0.450 to a proper fraction