To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

a. DSL Degree
b. SSL Degree
c. SSL Certificate
d. DSL Certificate

Answers

Answer 1

Answer:

c. SSL Certificate

Explanation:

The full form of SSL is Secure Sockets Layer. It is the standard security technology which establishes the encrypted link between a client and the server—typically a web server (which is the website) and the browser, or the mail server along with a mail client (for e.g., Outlook).

In the context, in order to develop an SSL connection, an SSL Certificate is required by the Web server.


Related Questions

A box has an equal number of red and green balls. What is the probability of a red ball being chosen if the box has a total of 24 balls

Answers

Answer:

50%

Explanation:

Cuz

5. Identify the invalid data in the worksheet and correct the entry as follows: a. Circle the invalid data in the worksheet. b. Type 15 as the minimum number of trainees for the Tech Skills program (cell C5). c. Verify that this change cleared the remaining errors in the worksheet

Answers

Answer:

a. Use conditional format, select the worksheet, input a condition in a given column, and use a circle to format the invalid data rows.

b. Double-click on cell C5, delete the current data and input 15.

c. If the errors are corrected, the circles are removed.

Explanation:

Microsoft Excel is a spreadsheet application used to manipulate statistical data. It is made up of cells arranged in rows and columns. There are several built-in formulas and tools used to analyze data.

The conditional formatting tool is an example of excel tools used for analysis. In conditional formatting, a pattern is selected to be used in a selected column or worksheet if a condition is met, if not, the pattern will not be used.

Write a program that reads in numbers separated by a space in one line and displays distinct numbers

Answers

Answer:

Here is the Python program:

def distinct(list1):  

   list2 = []  

   for number in list1:  

       if number not in list2:  

           list2.append(number)  

   for number in list2:  

       print(number)

       

numbers =(input("Enter your numbers: ")).split()

print("The distinct numbers are: ")

distinct(numbers)

 

Explanation:

The above program has a function named distinct that takes a list of numbers as parameter. The numbers are stored in list1. It then creates another list named list2. The for loop iterates through each number in list1 and if condition inside for loop check if that number in list1 is already in list2 or not. This is used to only add distinct numbers from list1 to list2. Then the second for loop iterates through each number in list2 and displays the distinct numbers in output.

To check the working of the above method, the numbers are input from user and stored in numbers. Then these numbers are split into a list. In the last distinct method is called by passing the numbers list to it in order to display the distinct numbers. The program along with its output is attached in a screenshot.

Here's my solution in python:

nums = set(input("Enter numbers: ").split())

print("The distinct numbers are:")

for x in nums:

   print(x)

Write and execute a single query that will isplay all of the information in the Customer, Rentals, and Rentcost tables in a single resultset. Be sure to display each field only once in your output. Order your results in ascending order by Customer.CID and Rentcost.Make .You should have 12 rows and 12 columns in your result.In this lab, you will be working with the follwing tables in SQL Server. To create and populate these tables in SQL Server, run the queries that are listed below these tables.CUSTOMERCIDCNameAgeResid_CityBirthPlace1BLACK40ERIETAMPA2GREEN25CARYERIE3JONES30HEMETTAMPA4MARTIN35HEMETTAMPA5SIMON22ERIEERIE6VERNON60CARYCARY7WILSON25DENVERAUSTINIn the CUSTOMER table, CName is the primary key.RENTALSRtnCIDMakeDate_OutPickupDate_returnedReturn_city11FORD10-Oct-2010CARY12-Oct-2010CARY21GM01-Nov-2009TAMPA05-Nov-2009CARY31FORD01-Jan-2009ERIE10-Jan-2009ERIE42NISSAN07-Nov-2010TAMPA53FORD01-Oct-2010CARY31-Oct-2010ERIE63GM01-Aug-2009ERIE05-Aug-2009ERIE74FORD01-Aug-2010CARY12-Aug-2010ERIE85GM01-Sep-2010ERIEIn the table RENTALS, Rtn is the primary key and represents the rental number. CID is a foreign key in the RENTALS table and refers to the CID in CUSTOMER; Pickup is the city where the car was picked up; and Date_Out is the date in which the car was rented out. Return_city is the city where the car was returned. Date_returne is the date in which the vehicle was returned. If the car has not yet been returned, Date_returned and Return_city are null.RENTCOSTMAKECOSTFORD30GM40NISSAN30TOYOTA20VOLVO50The RENTCOST table stores the rates pe day of each vehicle. The primary key of this table is MAKE, and it is a foreign key in the RENTALS table.create database AutoRentalsgouse AutoRentalsgocreate table Customer(CID integer,CName varchar(20),Age integer,Resid_City varchar(20),BirthPlace varchar(20),Constraint PK_Customer Primary Key (CID))insert Customerselect 1, 'Black', 40, 'Erie', 'Tampa'insert Customerselect 2, 'Green', 25, 'Cary', 'Erie'insert Customerselect 3, 'Jones', 30, 'Hemet', 'Tampa'insert Customerselect 4, 'Martin', 35, 'Hemet', 'Tampa'insert Customerselect 5, 'Simon', 22, 'Erie', 'Erie'insert Customerselect 6, 'Vernon', 60, 'Cary', 'Cary'insert Customerselect 7, 'Wilson', 25, 'Denver', 'Austin'create table Rentcost(Make varchar(20),Cost float,constraint PK_Rentcost Primary Key (Make))insert Rentcostselect 'Ford', 30insert Rentcostselect 'GM', 40insert Rentcostselect 'Nissan', 30insert Rentcostselect 'Toyota', 20insert Rentcostselect 'Volvo', 50Create table Rentals(Rtn integer,CID integer,Make varchar(20),Date_Out smalldatetime,Pickup varchar(20),Date_returned smalldatetime,Return_city varchar(20),Constraint PK_Rentals Primary Key (Rtn),Constraint FK_CustomerRentals Foreign Key (CID) References Customer,Constraint FK_RentCostRentals Foreign Key (Make) References Rentcost)insert Rentalsselect 1, 1, 'Ford', '10/10/2010', 'Cary', '10/12/2010', 'Cary'insert Rentalsselect 2, 1, 'GM', '11/1/2009', 'Tampa', '11/5/2009', 'Cary'insert Rentalsselect 3, 1, 'Ford', '1/1/2009', 'Erie', '1/10/2009', 'Erie'insert Rentalsselect 4, 2, 'Nissan', '11/7/2010', 'Tampa', null, nullinsert Rentalsselect 5, 3, 'Ford', '10/1/2010', 'Cary', '10/31/2010', 'Erie'insert Rentalsselect 6, 3, 'GM', '8/1/2009', 'Erie', '8/5/2009', 'Erie'insert Rentalsselect 7, 4, 'Ford', '8/1/2010', 'Cary', '8/12/2010', 'Erie'insert Rentalsselect 8, 5, 'GM', '9/1/2010', 'Erie', null, null

Answers

Answer:

SELECT DISTINCT Customer.CID , Customer.CName , Customer.Age , Customer.Resid_City , Customer.BirthPlace , Rentals.Rtn, Rentals.data_out. Rentals.pickup, Rentals.data_returned, Rental.return_city, RentCost.make, RentCost.cost

   FROM Customer

   JOIN Rentals ON Customer.CID = Rentals.CID

   JOIN RentCost ON Rentals.make = RentCost.make.

   ORDER BY Customer.CID AND RentCost.make

Explanation:

The returned output is a 12-field table, in ascending order of the customer's id and the make of the car rented.

As a top-level executive at your own company, you are worried that your employees may steal confidential data too easily by downloading and taking home data onto thumb drives. What is the best way to prevent this from happening?

Answers

Answer:

Explanation:

The best thing to do would be to include a ban on thumb drives in the employment contract, that way any employees that bring/use thumb drives would be in violation of their contract and would have to deal with the consequences. Another backup strategy would be implementing a security measure in all of the employee computer systems in order to prevent USB thumb drives from connecting to the computer.

what are your considerations in making a derivative ict content ti effectively communicate or present data or information?

matinong sagot pls :)

Answers

Answer:

1) Design

2)Content

Explanation:

The considerations in making a derivative ICT content to effectively

communicate or present data or information include the Design.

The design is what helps to portray and make the content more appealing and appropriate for the end users.

The content is the main body and it is vital in helping to provide the required information.

Write the function definition for the generato named 'generator_Magic which takes a single parameter 'n1', an Intege 1. Define the above Generator such tha it should yield the Magic constant(s) for the values starting from 3 to 'n1'. Note Printing the output will be taken care of during testing, so you need not print the Magic constants yielded by generator 'generator_Magic' and its Type. Input Format for C

Answers

Answer:

Method definition to this question can be defined as follows:

def generator_Magic(x1):#defining a method generator_Magic that accepts a variable  

   x = 3#defining a variable n that holds a integer value

   while x <= x1:#defining while loop that check value of x less than x1  

       Val = (x * (( x * x) + 1)) / 2#defining val variable that calculate value  

       #yield val

       return Val#return Val

       n = n + 1#increment the value of n

Explanation:

In the given question some of the data is missing that's why we only define the code, which can be defined as follows:

In this code a, method "generator_Magic" is declared, that hold one parameter "x1" in its parameter, and inside the method, a variable x is declared that hold an integer value and define a while loop to check value is greater than equal to "x1" and calculate the value into "Val" variable and return its value.

To display data in a certain manner, like alphabetical order, is called

analyzing
buffering
filtering
sorting

Answers

Answer:

D. Sorting

hope this helps!

Which input device is a part of a tablet computer?
A. printer
B. touch screen
C.
mouse
D. Scanner

Answers

Answer:

I think it's B. touch screen

Explanation:

Answer:

B. touch screen

Explanation:

The PCI-Express is made up of a bundle of thirty-two serial, bidirectional point-to-point buses. Each bidirectional bus is called an):________. a. Lane. b. Sub-bus. c. inner bus. d. component bus.

Answers

Answer:

A lane

Explanation:

What complications are imposed if one tries to implement a dynamic list using a traditional one-dimensional array

Answers

Answer: The expansion of the list will be required to move to a new location;

So the complications that will be imposed if one tries to implement a dynamic list using a traditional one-dimensional array is that the expansion of the list will need to move to a new location.

Explanation: When we talk about arrays,we are referring to data structures that are useful when the number of entries that are to be stored inside a list is fixed.

But for one to implement a dynamic list which always grows or shrinks at run-time arrays cannot be useful.This is because any alteration will make the entire array to be altered.

digital information processed into a useful form is called what

Answers

Answer:

Output

Explanation:

Output can be regarded as data or digital information that are been generated by a computer after it has undergone some processing . This digital information could be anything which can be seen such as picture and others , it's not limited to only words and number. This information can be result of of data calculation, printed documents. Output Devices could be a hardware component that helps in passing the information to people, this could be monitor that gives the information bon screen. It should be noted that output is a Digital information processed into a useful form.

types of email resources. Examples

Answers

Newsletter emails
Milestone emails
Welcome emails
Review request emails

Hope this helps!

Some examples of malware include:
a. Robots, virus, and worms
B. Trojans, worms, and bota
C. Computer ware, worms, and robots
D. Worms, system kits, and loggerware

Answers

Answer:

i thinks its c hehehe yea

Answer:

I believe it's C

Explanation:

the reason is because malware usually effects the computer ware

In a business environment, who is responsible for testing a website? the webmaster the website supervisor the customers who visit the site the search engine director

Answers

The correct answer is =
( the webmaster ) ✅✅

Trust me because, the webmaster is a person responsible for maintaining one or more websites. The title may refer to web architects, web developers, site authors, website administrators, website owners, website coordinators, or website publishers.

Answer:

the webmaster

Explanation:

answer this correct and get brainly
Using pseudocode, write an algorithm that someone else can follow.

Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart Write it out

Flowchart: Input leads to if statment. If true print response. if false print different response. Program ends. Get input:


If statement:



Print if true:



Print if false:

Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Answers

Pseudocode:

import random

fetch user input on a lucky number

insert input into variable - "response"

new variable, random = randint

condition to check wheather random is our response

display results

Python Code:

import random

def main():

response = int(input("Guess my lucky number, its between 1 and 100: "))

lucky_number = random.randint(1,100)

if response == lucky_number:

print(f"Wow you're right, it is {lucky_number}")

else:

print("Sorry, Try Again")

main()

Reminder:

intended for python3 as i included the format f

also it could be done without the import, just manually insert a number

i'll leave the post mortum to you

What is Cathode Ray Tube ?

Answers

Answer:

it is cathode ray tube used for display

Explanation:

Why is it important to have good naming conventions for files?

A. To make it easier to identify them
B. To easily apply passwords to them
C. To have Windows security applied
D. To store more than 256 files in one location

PLS HELP
Award: 15pts

Answers

A. To make it easier to ID them

“Back in the day”. One was limited to xxxxxxxx.yyy. 8.3. Name and extension

Many times had to open a file to actually see what what it referred to.

Also when doing search of a drive or folder key words in the naming help discover what you are looking for. Less guessing....

Answer:

To make it easier to identify them

Explanation:

when you open a browser window it opens in a _____________.
A.menu

B.folder

C.field

D.window.




If you have any questions regarding to the question let me know in the comment section and I will answer them.
Stay safe and healthy.
Thanks!!!!​

Answers

The answer is D window

A(n) ________ statement specifies the value that is returned from the function when the function ends.

Answers

Answer:

The appropriate answer is "return ". A further explanation is given below.

Explanation:

The return seems to be a statement or declaration throughout the programming that instructs a program to consider leaving the subroutine as well as then go up later to either the return address. The return address wherever another subroutine becomes named is found. This statement has either been returning and perhaps return value in certain computer languages.

What is the output?
numB = 25
while numB > 13:
numB = numB - 5
print(numB)
Output:

Answers

Answer:

Output: 10

i tried out the code and it outputted 10.

Answer:

10

Explanation:

I got it right

Rebecca has downloaded a trial version of Microsoft Office. But she finds that she cannot complete all of her assignments because some functions she needs are not included in the trial version. To what type of software does this application belong?
A. Open source software
B. Shareware
C. Custom software

Answers

Answer:

B. Shareware

Explanation:

This trial version of microsoft office that she downloaded belongs to the shareware software. As a Shareware software, it can be downloaded for free. But it is copyrighted by the person who owns it or the developer. It is free for use for a given range or period of time. And unlike the full suite, all of its functionalities would not work since it is just a trial version.

Do you think the divide will fade in time? Write your opinion

Answers

Answer:

This may not be helpful but it really depends on your opinion! I do believe it will but please follow the honor code :)

Explanation:

YES!

I hope it is helpful for you .....

Please mark me as brainliest ......

a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of public interest and that often carries advertising​

Answers

Answer:

adsfafdfads

Explanation:

afdafdsa

What are two explanations of internet safety?

Answers

Using and setting a password for any accounts, don’t respond to anyone you don’t know or a friend doesn’t know personally

Answer:

It is important to be safe on the internet to protect yourself and those around you. The internet is a place where no mercy is held so it is up to us to make sure that we stay safe and never give out personal information. Make sure to report suspicious activity and always tell a trusted adult if you are feeling sceptical on anything because, its better to be safe than sorry!

How did I write the following five things in Python?
Ask the user for their first name
Say “Hello” followed by the user’s first name
Ask the user how old they are
Tell the user how old they will be in 10 years and in 20 years
Tell the user how old they were 5 years ago

Answers

name = input("What is your first name? ")

print("Hello "+name)

age = int(input("How old are you? "))

print("In 10 years, you will be "+str(age+10))

print("In 20 years, you will be "+str(age+20))

print("5 years ago you were "+str(age - 5))

I hope this helps!

The program is an illustration of a sequential program.

Sequential programs are programs that do not require loops or conditional statements

The Python program

The program written in Python, is as follows:

#This gets input for first name

firstName = input("Your first name: ")

#This prints Hello, followed by the first name

print("Hello "+firstName)

#This gets input for age

yourAge = int(input("Your age: "))

#The next three lines print the ages in 10, 20 and -5 years time

print("You will be "+str(yourAge+10)+" in 10 years")

print("You will be "+str(yourAge+20)+" in 20 years")

print("You were "+str(yourAge-5)+", 5 years ago")

Read more about programs at:

https://brainly.com/question/24833629

#SPJ2

Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it?

Answers

Answer:

The threats agents may  be interested in attacking includes  

Dos ( denial of service ) Attacks. Blackmailing end-users for information. Attacker can buy products for no price ( zero price )The threat of raising prices of products with fake valueTheft of the products at return The threat of  the miss use of personal details of customers.

Explanation:

Since the Appmaker implements a customer-facing store that processes financial transactions

The threats agents may  be interested in attacking includes  

Dos ( denial of service ) Attacks. Blackmailing end-users for information. Attacker can buy products for no price ( zero price )The threat of raising prices of products with fake valueTheft of the products at return The threat of  the miss use of personal details of customers.

"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequence. Create a for loop that compares the two strings. For each match, add one point to user_score. Upon a mismatch, end the game.
Sample output with inputs: 'RRGBRYYBGY' 'RRGBBRYBGY'
User score: 4
in python please

Answers

import random

letters=["R", "G", "B", "Y"]

i = 0

to_guess = ""

while i < 10:

   to_guess += random.choice(letters)

   i += 1

print("Simon says "+to_guess)

user_score = 0

user = input()

for x in range(0, len(to_guess)):

   try:

       if user[x] == to_guess[x]:

           user_score += 1

       else:

           break

   except IndexError:

       break

print("User score: "+str(user_score))

I hope this helps!

Answer:

import random

validletters=["R", "G", "B", "Y"]

input1 = ""

for i in range(1,11):

     input1 = input1 + random.choice(validletters)

input2 = input("Input String 2: ")

if len(input2) != 10:

     print("Invalid Length")

else:

     user_score = 0

     for i in range(0,10):

           if(input1[i] == input2[i]):

                 user_score = user_score + 1

           else:

                 break

     print("String: "+input1)

     print("Guess: "+input2)

     print("User Score: "+str(user_score))

Explanation:

The code assumes that user input will always be R, G, B or Y

The next two lines get two string user inputs

import random

This lists the valid letters

validletters=["R", "G", "B", "Y"]

This initializes an empty string

input1 = ""

The following iteration generates the input string of 10 characters

for i in range(1,11):

     input1 = input1 + random.choice(validletters)

This prompts user for input string

input2 = input("Input String 2: ")

This checks if input string is up to length of 10

if len(input2) != 10:

If yes, it prints invalid length

     print("Invalid Length")

else:

If otherwise, user_score is initialized to 0

     user_score = 0

The following iteration checks for matching characters in both strings

     for i in range(0,10):

           if(input1[i] == input2[i]):

                 user_score = user_score + 1  This increments user_score by 1 if there is a match

           else:

                 break  This ends the program if there is no match

The next three lines print the strings and the user score

     print("String: "+input1)

     print("Guess: "+input2)

     print("User Score: "+str(user_score))

What is the definition of delimited text? Characters are separated by commas or tabs. Characters are separated by spaces. Characters run together without separation. Characters have no limit.

Answers

Answer:

delimited: having fixed boundaries or limits.

Explanation:

Go from there with that definition

Answer:

A. Characters are separated by commas or tabs.

Explanation:

On Edge

please choose the correct answer please tell fast​

Answers

Answer:

the answer might be 2......

Other Questions
How did Admiral Chester Nimitz displease the US Congress during World War II?He insisted the US should focus on the Pacific rather than the European theater.He refused to take the US fleet into battle immediately after Japan attacked Pearl Harbor.He did not want to drop the atomic bomb in order to convince the Japanese leadership to surrender.He promoted and implemented a no surrender policy among US troops in the Pacific. enlist the function of the liver of frog how do Blake's actions set the plot of the passage in motion? Read the excerpt from Infinite Jest.This is not working out. It strikes me that EXIT signs would look to a native speaker of Latin like red-lit signsthat say HE LEAVES. I would yield to the urge to bolt for the door ahead of them if I could know that boltingfor the door is what the men in this room would see. DeLint is murmuring something to the tennis coach.Sounds of keyboards, phone consoles as the door is briefly opened, then firmly shut. I am alone amongadministrative heads.Based on this excerpt, what can be inferred about the narrator?O He is eager to play tennis and study at the universityO He wishes his Uncle Charles would return to the room.O He would rather attend another university.He is uncomfortable with the interview process. WILL GIVE BRAINLIEST determine if the function is linear. if it is, find the rate of change lowest common multiple of 45 and 60 If blue is blue then what is light blueThink about it MARK BRAINLIEST!!!!!!! At a display booth at an amusement park, every visitor gets a gift bag. Some of the bags have items in them as shown in the table below. Items in the Gift Bags Items Bags Hat Every 2nd visitor T-shirt Every 7th visitor Backpack Every 10th visitor How often will a bag contain all three items? LCM or GCF? Give me 5 fun facts! Which of the following statements about the federal government of the United States is not true?a.The executive branch can execute laws and veto legislative acts.c.The legislative branch includes the Senate and the House of Representatives.b.The President is chief of the executive branch.d.The Supreme Court rules over the legislative branch.Please select the best answer from the choices providedABCD Which activity is an example of a chemical change?Dissolving table sugar in water.Drops of water forming on a cup of iced tea on a hot day.Melting gold to make jewelry.An old penny rusting. why do large food molecules like complex carbohydrates seem to disappear in the digestive system? What are the main ingredients of this food item? Pls need help no explanation just the answer! Please help me.I'll give you some points how important do you think chivalry was in the history of Europe In "A Wolf and Little Daughter," the author repeats the phrase "pit-a-pat" when the wolf is chasing the girl to In plants glucose is converted to sauces in and human muscle cells glucose is converted to Dallas and his brothers are examples of which life activity How did Aokas conversion to Buddhism change the way he governed the Mauryan Empire?The legal system became less harsh.Relationships with other kingdoms suffered.He stopped communicating with his subjects.He required his subjects to convert to Buddhism. The freezing point of of gasoline is about -50 degrees Celsius, and the freezing point of water is 0 degrees Celsius. What is the difference between the freezing point of water and gasoline? Explain your answer.