what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Answer 1

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:


Related Questions

Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​

Answers

Answer:

A.

Explanation:

Mark Brainliest if correct!

Answer: Previewing a text. (C)


Explanation: Just got it right.

coding word scramble

ICOAIPAPLTSN- a software program for end users

AADT- processed information

RAAEHWRD- physical parts of computer system

MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible

Answers

application, data, hardware, programming

The decoded words for the coding word are:

ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - Programming

What is coding words?

In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.

Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.

Read more about coding here:

https://brainly.com/question/26134656

#SPJ3

What is the unique name given to a class called?

Answers

Answer:

A class is an extensible program-code template for creating objects.

Source: https://en.wikipedia.org/wiki/Class_(computer_programming)

,  Hope this helps:)

Have a great day!!

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

Answers

Answer:

HIPAA

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

How do people decide their ethical behavior

Answers

Explanation:

Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.

Answer:

most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.

Explanation:

Dữ liệu trong 1CSDL được lưu trong

Answers

Answer:

ha ano daww??

Explanation:

??? btw thanks for the points

fields where computers are used include: business, education, banking, government, true or false​

Answers

Answer:

True. Most businesses use computers, including all 4 mentioned in your questions.

Can someone help me please?

Answers

Answer:

ummm this is hard i think answer is 5 robuk am pro

Explanation:

cuz me say soo

Please answer this thank you

As a good housekeeper, list down at least 5 ideal traits and why you should practice them in terms of housekeeping​

Answers

Cooking, for good food
Cleaning, a clean house

a modem is required for ________________ internet access.

Answers

Broadband I believe!

Why would you put money into a savings account? *
To make frequent withdrawals at ATM’s
To access the money from this account with personal checks
To easily access money from this account with a debit card
To earn interest on your money

Answers

Answer:

Most probably option 4, it has nice to earn interest from the bank.

What component uses thermal paste to attach the heat sink?

Answers

Answer:

Thermal compound is the answer

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described

Answers

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

Convert the denary number 44801 into hexadecimal

Answers

Numbers can be converted between bases.

The equivalent of 44801 in hexadecimal is: AF01

Denary numbers are simply base 10 numbers, while hexadecimal numbers are base 16 numbers

To convert from base 10 to base 16, we make use of division method (and we keep track of the remainders)

We keep dividing by 16, until we can no longer divide the numbers.

So, we have:

[tex]\mathbf{ 44801 \div 16 = 2800\ R\ 1}[/tex]

[tex]\mathbf{ 2800 \div 16 = 175\ R\ 0}[/tex]

[tex]\mathbf{ 175 \div 16 = 10\ R\ 15}[/tex]

[tex]\mathbf{ 10 \div 16 = 0\ R\ 10}[/tex]

Write out the remainders from bottom to top

(10) (15) 0 1

10 in hexadecimal is A15 in hexadecimal is F

So, the number becomes: AF01

Hence, the equivalent of 44801 in hexadecimal is: AF01

Read more about number conversions at:

https://brainly.com/question/2824068

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?​

Answers

Answer:

Just get it right and don't get stressed

Explanation:

An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]

whenever I try to make an account it says it can't sign me up at this time or something- can you help?-

Answers

Answer:

You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.

what is the answer ??​

Answers

Answer:

D all of the above

B operating system

the person above ^ me is correct

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

Why is the Game Design Document called a ""living"" document AND why is this important?

Answers

Answer:

documentation

Explanation:

Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important  

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

!!HELP!!
I need to know what the code is!!

Answers

What is the webpage link then click ctrl i that will show source code I am not for shure if this helps if not let me know

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

did someone hang themselves on set of wizard of oz

Answers

Answer:

One of the most ubiquitous of film legends holds that a munchkin hanged himself on-camera during the filming of 'The Wizard of Oz.' A lovelorn actor portraying one of the munchkins hanged himself on the set during the filming of The Wizard of Oz.

Explanation:

What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer:

10?

Explanation:

What is word in computer?

Answers

Answer:

In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.

This the answer you wanted? (brainliest?)

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

which device allows you to convert sounds into digital format to be used on the computer​

Answers

the correct anwser is ADC

how many times should the start function be defined in a program?

Answers

Answer:

0 1 2 However many you like

✓ I think its 2x they will start to define the program

Look around at your current surroundings. What type of light is present? If someone were to take a photo of you from the front, what type of lighting would be present in the image? Evaluate and describe the type of lighting in your present surroundings and the various types of lighting that would be present if someone were to take your photo right now.

Answers

Answer:

White light

Explanation:

The lights are white in the classroom

Answer: Personally, I have many lights throughout my bedroom, but the main focus being the one in the center, up top. This light brings a yellowish tone throughout the room and is very bright. My window is blocked off from a blackout curtain, so there is no natural light. And, my LED lights spread throughout the top of my room, bringing a red tone to the left side, but not nearly as present as my center lighting.

Explanation: kinda specific answer i submitted

Other Questions
Complete the similarity statement for the similar figures then find the scale factorplz help meadd explanation if you can What is the volume of the rectangular prism? Write an explicit formula for an, the n^th term of the sequence 22, 20, 18, .... The value of X (click photo) How to solve X2 + 2x -63 Charlie buys a new Bey Blade for $11.38. He gives the cashier $15.00. How much change will he get back? Select TWO ways he will get change. Read this excerpt from "How the World Was Made." Water Beetle darted in every direction over the surface of the water, but it could find no place to rest. There was no land at all. Then Water Beetle dived to the bottom of the water and brought up some soft mud. How does this incident propel the action of the story? The mud Water Beetle finds grows until it becomes a mountain. Water Beetle finds the stream that leads to the underworld. The mud that Water Beetle finds is used to create the earth. Water Beetle decides he wants to live in the water forever. what is 1/3 +4 x 3If you answer correctly i will give 100 points and Brainiest :) pls, help me!There are 10 sets of paper numbered 1 through 10 that are put in a jar. What is the probability of drawing at most a 3 when drawing out one slip of paper from the jar? What are the five ways fossils can form What is perspective?Your notecardsYour research sourcesYour point of viewYour opinions Which uses of soil are discussed in the video? Check all that apply. as a habitat for animals to live in as a way to clean and store water as a place for plants and crops to grow as a material to clean and smooth skin as a building material for homes and buildings as an area to build windmills for energy production Zhang Qian, a Chinese explorer, spentthirteen years travelling in the West. His original mission wasto find ____________ to help China fight its enemies.Fill in the blank Limitations of managerial economics A chemical reaction takes place in a closed system. The mass of the reactants before the reaction was 35 grams. What mustthe mass of the products of the reaction be, according to the law of conservation of mass?25 grams30 grams35 grams70 grams Triangle 2 is a scale drawing of Triangle 1.Based on the information in the diagram, what is the length of side b? In KLM, k = 76 inches, l = 30 inches and m=69 inches. Find the measure of M to the nearest degree. pleseeeeee what is modified cloze procedure what does it mean need help please helpp!I will mark brainliest name some rhetorical devices used in Emersons "Self Reliance"