1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
4 years ago
15

The definition of HTTP makes use of the ASCII character set without reference to how these characters are encoded. Explain why t

his is an example of abstraction.
Computers and Technology
2 answers:
solniwko [45]4 years ago
4 0
Abstraction comes from two latin words; abs which means away and trahere which mean to draw. From the meaning itself, it is to draw away something from specific objects, individuals, group, etc. In the computer world, a programmer hides all relevant data pertaining to the relevance of a data. It is done to increase efficiency and and reduce complexity. 
Nezavi [6.7K]4 years ago
4 0

HTTP protocol works in layers and one layer makes use of functionality given by the other layer below it. Therefore, it is a perfect example of abstraction on the internet. HTTP protocol is not dependent on anything except the text protocol on which it works.

Further explanation:

Working of HTTP protocol: It is an application layer protocol built on the top of TCP which uses client server model. Client and server communicate through request and response messages.  

The HTTP messages are of three types:

HTTP GET- Client sent the message to server having only URL which may have zero or optional parameter at the end of the URL. The server process on the optional data of the URL and sent back the result to the browser.

HTTP POST- Messages place the optional data parameters to the body of request message instead of adding to the end of the URL.

HTTP HEAD- The server sends back the header information to the client rather than sending full contents of the URL.

Disadvantages:

Messages transmitted over HTTP have several issues:

  • Error in creation of the web pages.
  • User error
  • Temporary network glitches
  • Malfunction of the web server or web browser

Learn more:

1. A company that allows you to license software monthly to use online is an example of ?brainly.com/question/10410011

2. How does coding work on computers?  brainly.com/question/2257971

Answer details:

Grade: Graduate Engineering

Subject: Computer Science

Chapter: Internet Technology

Keyword:

HTTP, protocol, browser, client server model, get, set, head, web, network, TCP, IP, URL header, request, response, messages, ASCII characters, parameter, abstraction, parameter

You might be interested in
Python
ladessa [460]

def is_list_even(my_list):

   for i in my_list:

       if(i%2 != 0):

           return False

   

   return True

   

   

def is_list_odd(my_list):

   for i in my_list:

       if(i%2 == 0):

           return False

   

   return True

   

def main():

   n = int(input())

   lst = []

   

   for i in range(n):

       lst.append(int(input()))

   

   if(is_list_even(lst)):

       print('all even')

   

   elif(is_list_odd(lst)):

       print('all odd')

   

   else:

       print('not even or odd')

       

       

if __name__ == '__main__':

   main()

8 0
2 years ago
Key exchange is so important that you should write your own to avoid bugs in other people s libraries. (
lana [24]

Answer:

The answer to this question is the option "a".

Explanation:

key exchange is a method of cryptography(It is a method of protecting data through the use of codes like [email protected]#.) by which the data exchange between two parties. It follows a cryptographic algorithm. The key exchange also used for key establishment.key exchange is used for data encryption so the answer to this question is true.

8 0
3 years ago
A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A
Gnom [1K]

Answer:

A. Exhausted DHCP scope.

Explanation:

The company has many temporary workers, and permanent workers. There are many people under one network. Since, there are many workers, there can't be untrusted SSL certificates. They all have different devices or computers, so they can't both have duplicate MAC addresses. Lastly, the firewall is supposed to protect against computer viruses and other types of malware, not to harm the user and scope. So, the answer is A.

4 0
3 years ago
Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
My name is Ann [436]

TCP/IP networking designer is the one Layer 2 or wireless WAN technology presented in Lesson 3.

<h3>What are the pros and cons of TCP/IP networking?</h3>

It's interoperable, which means it lets diverse networks communicate across platforms. It's a set of open protocols. Because it is not held by any one institution, it can be used by anybody or any group. It's a client-server architecture that's scalable.

Thus, it is TCP/IP networking

For more details about pros and cons of TCP/IP networking, click here:

brainly.com/question/13486460

#SPJ1

5 0
3 years ago
What was the basic invention that has evolved into the modern automobile?
anygoal [31]

Answer:

I would say Henry Ford's invention; the Ford car company, since we still have Ford cars running nowadays.

Explanation:

3 0
4 years ago
Other questions:
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • • Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
    5·1 answer
  • NEED HELP NOW 25 POINTS WILL MARK BRAINLIEST!!!!!!!
    8·1 answer
  • Suppose that a main method encounters the statement t3.join(); Suppose that thread t3's run() method has completed running. What
    15·1 answer
  • Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
    11·1 answer
  • If you want to go directly to a specific web page using a URL, where should you type the URL in Firefox?
    14·2 answers
  • a. Create an Abstract class called Vehicle with abstract methods accelerate, stop, and gas, &amp; data of your choice (5 marks)
    12·1 answer
  • Match each type of video camera to its features:
    15·1 answer
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion
    13·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!