For secure communication across the Internet, which protocol is used to access or post web server information?

a. HTTPS
b. SHTTP
c. Telnet
d. STelnet

A

Computer Science & Information Technology

You might also like to view...

Cascade options enable you to make changes to related fields or records that would not be able to do if only referential integrity is enforced

Indicate whether the statement is true or false

Computer Science & Information Technology

How is a finally clause different from a try block and a catch clause?

What will be an ideal response?

Computer Science & Information Technology