1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
4 years ago
9

An internet address that ends in .com is operated by

Computers and Technology
2 answers:
pychu [463]4 years ago
7 0

Answer:

The answer to the given question is "Company site".

Explanation:

In the URL (uniform resource locator). When a website address ends with .com.So, it is used for the Commercial sites that are managed by the companies.

When the sites use .com extension it represents that it is mainly an internet-based site.

That's why the answer to this question is "Company site".

ollegr [7]4 years ago
4 0
.com means company, so it is ran by a company.

You might be interested in
The following code accomplishes which of the tasks written below? Assume list is an int array that stores positive int values on
liq [111]

Answer:

It stores the largest value in list (the maximum) in the variable 'foo'.

Explanation:

<u>Following are the description of the answer</u>:

In the above code, they set and initialize the integer data type variable that is 'foo' to 0. Then, they set the for loop that iterates from 0 and end at length of the list. Then, they check the condition, if the list of j i.e., list[j] is greater than the variable 'foo', then the value of the list[j] stored in the variable 'foo'.

So, if the value of the list[j] is greater than 0, then the value of the list[j] is initialized in the variable 'foo'. That's why it stores the largest value.

6 0
3 years ago
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Fynjy0 [20]

Answer:

thunderbold proly

Explanation:

5 0
3 years ago
Linda is viewing the campaign report in her Google Ads account after successfully implementing conversion tracking tags for her
anyanavicka [17]

Answer:

Option 1 and Option 3 are correct.

Explanation:

Linda is displaying that marketing update within the Google Advertising profile after effectively installing transformation monitoring tags to its site. She saw that slightly two of her advertising are created by the following View-through transformations.

Thus, somebody seeing up towards Thirty seconds of such advertisements as well as anyone clicking on a portion of such advertising as View-through transformations.

6 0
3 years ago
Match each item with a statement below. - A parameter in a method header. - A set of methods that can accept a call given the pa
Bas_tet [7]

Answer:

                                 

Explanation:

6 0
3 years ago
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Other questions:
  • Why is art important to heritage?
    10·1 answer
  • A network admin configures a static route on the edge router of a network to assign a gateway of last resort (the router that co
    9·1 answer
  • The processor itself is not a resource, therefore the OS is not involved in deciding how much of the processor time is used for
    14·2 answers
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • Scientists measure an object’s mass in kilograms and its weight in newtons. If you knowthe amount of mass of an object in kilogr
    5·1 answer
  • How do computers benefit individuals' health care?
    10·1 answer
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • A user can add color to a database to highlight a modification. To do this with a macro, which command screen would you access o
    9·1 answer
  • What term is used to describe selecting and viewing information in a database?
    6·2 answers
  • shayne keeps his home office computer on his desk. he wants to use a wireless keyboard and mouse, and to send output to his prin
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!