1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
2 years ago
14

What indicates a website of a university

Computers and Technology
1 answer:
ad-work [718]2 years ago
8 0

Answer:

The domain suffix/TLD .edu is reserved for colleges and universities

Examples:

harvard.edu

stanford.edu

juilliard.edu

You might be interested in
You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
icang [17]

Answer:

Tactic Exchange

Explanation:

The approaching style of the student to his/her friend for help is of an influence categorized as the "Exchange Influence Tactic".

The Exchange Influence Tactic refers to when a person persuades someone or seeks influence over him/her by offering some sort of reward for their help rendered. It might also work by reminding other person of any favor which you offered in the past that should be repaid now.

Here the student is seeking help of his/her friend for completion of a final report for which he/she is already late. In exchange the student is assuring his/her friend the completion of certain spreadsheets which are pending on him/her. Hence, the student has used the exchange tactic to get his work done by offering a favor in response.

3 0
3 years ago
Explain the difference between overexposed vs. underexposed images?
hichkok12 [17]

Answer:

If a photo is too dark, it is underexposed. Details will be lost in the shadows and the darkest areas of the image. If a photo is too light, it is overexposed. Details will be lost in the highlights and the brightest parts of the image.

3 0
2 years ago
Read 2 more answers
Imagine you are building an ATM system; list at least 6 application domains for the system. That is, in which context is the sys
Anvisha [2.4K]

Answer:

Six applications domains for the ATM was listed below in the explanation section below

The main aim of the ATM is cash collection, user information update.

The users of the ATM are people, staff, customers/clients.

Explanation:

Solution

Given that

The Application domain for the system is given below:

  • The System is going to verify the details entered
  • Update the database on the server side
  • Calculation of cash Available
  • Count the Cash and Identify the note in the Machine
  • Troubleshooting of the ATM machine (system)
  • Backup of the system and Operating system /Software installed on the ATM machine.

The ATM is going to be used for the purpose of collecting cash, updating user information, cashing cheques etc and is used by all the Bank customers.

Who are the users of ATM:

  • Customers at the bank
  • Individuals /people
  • Staff of the Bank
3 0
3 years ago
Which of the following tasks would a database administrator perform ? A identify computer security photos, B. Make sure protocol
sattari [20]
B.) Make sure protocols are in place and are being followed. 


Good luck, hope this helps! (:
6 0
3 years ago
graphic designers can compress files in different formats . One of the formats ensures that the quality and details of the image
musickatia [10]

Answer:

The format that is used is: PNG

Explanation:

7 0
3 years ago
Other questions:
  • what is it called when you are biying and selling products via electronic channels such as the internet​
    13·2 answers
  • Which of the following is not an advantage of using asynchronous data transmission
    15·1 answer
  • Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
    14·2 answers
  • Which is the first thing that would happen if a plant could NOT obtain carbon dioxide? A It would not be able to reproduce. B It
    5·1 answer
  • Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exac
    7·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
    8·1 answer
  • Project manager Erica is discussing with her team to prepare a document to describe the deliverables and goals of a software pro
    13·1 answer
  • PLEASE HELP ASAP!!! 99 POINTS FOR 3 MULTIPLE CHOICE QUESTIONS!!! PLEASE ANSWER ALL!!!
    8·1 answer
  • What are backup storage devices of computer? Why are they necessary in the computer system?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!