1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
2 years ago
7

Meaning of U.R.L in computer​

Computers and Technology
2 answers:
hodyreva [135]2 years ago
4 0
Uniform Resource Locator. It is the unique address that each webpage has, which makes it easier for us to access them
4vir4ik [10]2 years ago
3 0

Uniform Resource Locator, or URL, is an Internet resource address and a reference to that resource.

A URL has two main components:

  • Protocol identifier: For the URL http://example.c0m, the protocol identifier is http.
  • Resource name: For the URL http://example.c0m, the resource name is example.com.

The resource name and the protocol identification are separated from one another by a colon and two forward slashes. The name of the protocol to be used to get the resource is indicated by the protocol identifier. The Hypertext Transfer Protocol (HTTP), which is frequently used to serve up hypertext content, is utilized in the sample. One of the many different protocols used to access various kinds of online content is HTTP. The File Transfer Protocol (FTP), Gopher, File, and News are further protocols.

The full address to the resource is contained in the resource name. However, for many protocols, including HTTP, the resource name comprises one or more of the following elements. The structure of the resource name totally depends on the protocol being used.

Host Name: The name of the computer that houses the resource.

Filename: The computer's pathname for the file.

the port number to which you should connect (typically optional).

Referencing a named anchor inside a resource that often designates a particular spot within a file (typically optional).

Many protocols only need the host name and filename, while others allow for the port number and reference. For instance, the resource name for an HTTP URL must include the host name of the network server, the filename of the content on that server, a port number, and a reference.

You might be interested in
How can a user view the options for Junk E-mail?
alexdok [17]
B. by right clicking all messages in the junk email folder
8 0
3 years ago
Read 2 more answers
After a file downloads, you can do any of the following except
loris [4]
Change owner rights... I think you forgot to put the choices, I am taking a wild guess of what the answers could have been.
8 0
3 years ago
Under normal operations, cisco recommends that you configure switch ports on which vlan
larisa86 [58]

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





3 0
3 years ago
You are given two variables, already declared and assigned values, one of type double, named price, containing the price of an o
Oksi-84 [34.3K]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main() {

//variable to store input

double price;

int totalNumber;

// variable to store total price

double total_price;

cout<<"Enter the price of an order:";

// read the price of an order

cin>>price;

cout<<"Enter the number of orders:";

// read the total number of orders

cin>>totalNumber;

// calculate total price of all orders

total_price=price*totalNumber;

cout<<"total price of all orders: "<<total_price<<endl;

return 0;

}

Explanation:

Declare three variables "price" of double type,"totalNumber" of int type And "total_price" of type double.Read the value of an order and number of orders. The calculate the total price by multiply "price" with "totalNumber" and assign it to variable "total_price". Print the total price.

Output:

Enter the price of an order:12.5                                                                                                                              

Enter the number of orders:3                                                                                                                                  

total price of all orders: 37.5

7 0
4 years ago
Ssume that the timeout values for all three protocols
prisoha [69]

Answer:

The explanation of the question is described in the section below.

Explanation:

(a)

Go Back N :

A gives in a maximum of 9 pieces. Typically they will be sent back sections 1, 2, 3, 4, 5 and then re-sent segments 2, 3, 4 and 5.

B sends out 8 ACK's. They are 4 ACKS including 1 series and 4 ACKS with 2, 3, 4 and 5 series amounts.

Selective Repeat :

A sends in such max of 6 bits. Subsequently, segments 1, 2, 3, 4, 5 and earlier re-sent Segments 2 will be sent.

B assigns five ACKs. We are 4our ACKS with numbers 1, 3, 4, 5. However there is one sequence quantity 2 ACK.

TCP :

A assigns in a total of 6 bits. Originally, segments 1, 2, 3, 4, 5 and future re-sent Segments 2 have always been sent.

B sends five ACKs. There are 4 ACKS with either the number 2 series. There has been one ACK with a sequence of numbers 6. Remember that TCP always needs to send an ACK with a sequence number you anticipate.

(b)

This is although TCP utilizes convenient retransmission without searching for the time out.

So, it's the right answer.

4 0
3 years ago
Other questions:
  • The font size on presentation slides should not be smaller than _____ -point.
    10·1 answer
  • While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
    13·1 answer
  • JAVA
    14·1 answer
  • A(n) ____ uses the communication interface to request resources, and the server responds to these requests.
    15·1 answer
  • Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word i
    10·1 answer
  • What determines how a system will work to meet the business needs defined during system investigation?
    13·1 answer
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • A major retailer wants to enhance their customer experience and reduce losses
    9·1 answer
  • What type is the combination of an integer and a string
    13·1 answer
  • Write a short essay about the best rotary-wing aircraft ever. It must be a specific aircraft and consist of three paragraphs. In
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!