1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
1 year ago
7

Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained

Computers and Technology
1 answer:
crimeas [40]1 year ago
7 0

The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

<h3>What is cache on a browser?</h3>

The browser cache is known to be a kind of 'cache' tool that is often used by a person's internet browser so that one can fasten up the page loading act.

Hence, The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

Learn more about browser cache from

brainly.com/question/14598358

#SPJ1

You might be interested in
Adam receives an email from his bank telling him there is a problem with his account. The email provides instructions and a link
Georgia [21]

Answer:

2 and 3

Explanation:

fill out all details because the email looks authentic

call the bank to determine if he email is authentic

hope this helps

8 0
2 years ago
Read 2 more answers
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
1. Write a Python code to:
Ksenya-84 [330]

Answer:

hope this help and do consider giving brainliest

Explanation:

1)

a)

import numpy as np

A=np.array([[1,4,3,2],[1,7,4,5],[2,5,3,1],[1,3,2,9]]);

print("Inverse is");

B=np.linalg.inv(A);

print(B);

print("A*A^-1=");

print(np.dot(A,B));

print("A^-1*A=");

print(np.dot(B,A));

2)

import numpy as np

A=np.array([[4,3,2],[5,6,3],[3,5,2]]);

B=np.array([[3,-1,2,6],[7,4,1,5],[5,2,4,1]]);

X=np.dot(np.linalg.inv(A),B);

print("X=");

print(X);

5 0
3 years ago
When you ask the database more complex questions using comparison operators, you are conducting a _____?
yulyashka [42]
<span>When you ask the database more complex questions using comparison operators, you are conducting a query.
</span><span>The term "query" denotes  a programmatic statement that is understand by a the DBMS(Database management system) that understands how to access and manipulate data within a database. </span>
7 0
3 years ago
Read 2 more answers
After pasting data, what can be done to access more options for how to paste it? You can change the formatting in the original c
uysha [10]

<span>You can click the smart tag that pops up after pasting.
</span>

♣Amaranthine
8 0
3 years ago
Other questions:
  • Why are using some special characters (@, #, !, etc.) not a good idea?
    13·2 answers
  • How does ur computer know that its cursor moved
    10·2 answers
  • Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
    9·1 answer
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • What is a distraction that you find when photographing animals at the zoo
    11·1 answer
  • Answer to this if you have apex legends on either pc xbox one or PS4 for the one that answers and does gets brainliest please do
    11·2 answers
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • What is not true of credit scores?
    11·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • HELP ASAP !!! What should be a one-page document?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!