For secure communication across the Internet, which protocol is used to access or post web server information?
a. HTTPS
b. SHTTP
c. Telnet
d. STelnet
A
Computer Science & Information Technology
You might also like to view...
Cascade options enable you to make changes to related fields or records that would not be able to do if only referential integrity is enforced
Indicate whether the statement is true or false
Computer Science & Information Technology
How is a finally clause different from a try block and a catch clause?
What will be an ideal response?
Computer Science & Information Technology