1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
1 year ago
12

Describe server processing of a post request. in the case of cgi processing, how does the server pass information to a cgi progr

am (request headers, body, url parameters, etc. )?
Computers and Technology
1 answer:
Aneli [31]1 year ago
8 0

CGI is the part of the Web server that can communicate with other programs running on the server.

<h3>What is The Common Gateway Interface? </h3>

The Common Gateway Interface (CGI) provides middleware between WWW servers and external databases and information sources. The World Wide Web Consortium (W3C) defined the Common Gateway Interface (CGI) and also defined how a program interacts with an HTTP (Hyper Text Transfer Protocol) server.

The body of the message is sent to the CGI program by the server through the stanard input pipe. Using the value of content_length, which indicates the length of the body, the CGI program can parse the input and obtain the values of the data entered by the user.

See more about CGI at brainly.com/question/12972374

#SPJ1

You might be interested in
Cuáles son las redes sociales que más utilizas tú y tu familia. Describe su utilidad.
Ymorist [56]

Answer:

Facebok

Explanation:

we are able to see everthing other people do and are able to limit what are kids do

6 0
3 years ago
I need help with this
Mila [183]

Either Styles or Formula


5 0
3 years ago
Read 2 more answers
Assume that k corresponds to register $s0, n corresponds to register $s2 and the base of the array v is in $s1. What is the MIPS
BlackZzzverrR [31]

Answer:

hello your question lacks the C segment so here is the C segment

while ( k<n )

{v[k] = v[k+1];

     k = k+1; }

Answer : while:

   bge $s0, $s2, end   # while (k < n)

   addi $t0, $s0, 1    # $t0 = k+1

   sll $t0, $t0, 2     # making k+1 indexable

   add $t0, $t0, $s1   # $t0 = &v[k+1]

   lw $t0, 0($t0)      # $t0 = v[k+1]

   sll $t1, $s0, 2     # making k indexable

   add $t1, $t1, $s1   # $t1 = &v[k]

   sw $t0, 0($t1)      # v[k] = v[k+1]

   addi $s0, $s0, 1

   j while

end:

Explanation:

The MIPS assembly code corresponding to the C segment is

while:

   bge $s0, $s2, end   # while (k < n)

   addi $t0, $s0, 1    # $t0 = k+1

   sll $t0, $t0, 2     # making k+1 indexable

   add $t0, $t0, $s1   # $t0 = &v[k+1]

   lw $t0, 0($t0)      # $t0 = v[k+1]

   sll $t1, $s0, 2     # making k indexable

   add $t1, $t1, $s1   # $t1 = &v[k]

   sw $t0, 0($t1)      # v[k] = v[k+1]

   addi $s0, $s0, 1

   j while

end:

4 0
3 years ago
Two students have developed a protocol in which they send 4-bit messages to each other. they decide to modify their protocol to
Fantom [35]

The correct answer is 2^4 = 16 times as many values.

8 0
3 years ago
Read 2 more answers
To have the most impact when using email you should structure your message so that
VladimirAG [237]
It catches the readers attention making them respond to you quicker 
7 0
3 years ago
Other questions:
  • Bullet points on a slide should be limited to _____. 2 4 8 10
    15·2 answers
  • Which of the following allowed Temple Grandin to design more humane means of slaughtering cattle? she treated the cattle as inca
    5·2 answers
  • True or false a computer network requires both hardware and software
    9·2 answers
  • Three business partners are forming a company whose name will be of the form "name1, name2 and name3". however, they can't agree
    13·1 answer
  • You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap
    15·2 answers
  • 8. Which of the following could be measured by defining a goal in Google Analytics?
    13·1 answer
  • When more open-ended questions are asked in a study group, discussions are more likely to
    14·2 answers
  • Discuss the technologies that implements an infrastructure for component communication
    7·1 answer
  • What should I change my fortnite name to:<br> Barneys broken thumb or I dont have aim assist
    6·1 answer
  • What are the columns in a Microsoft Access table called?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!