1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
15

Which of the following URL extensions indicate the website is used by a college or university?

Computers and Technology
2 answers:
ExtremeBDS [4]3 years ago
7 0

The correct answer is (D) .edu

Explanation:

URL or Uniform Resource Locate refers to the set of words you use to locate a specific web page or the web address which is unique for each web page. Additionally, URL extensions refer to a section of URL that varies according to the web page's domain or type. In this way, "org" indicates the web page belongs to a non-profit organization while "mil" indicates the web page is from a military organization. In the case of web pages from colleges, universities and other education institutions this can be identified because they contain "edu" in their URL. Thus, the URL extension that indicates the website is used by a college or university is .edu.

Svetllana [295]3 years ago
4 0
The answer is (D) - .edu
You might be interested in
What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply.
viva [34]

All options in the Advanced tab in the Share Workbook dialog box.

  • Don’t keep change history
  • Show comments made by all users
  • Update changes when file is saved
  • Track changes for certain amount of days
  • Allow changes by more than one user at a time
  • Automatically update changes in certain time periods

<u>Explanation:</u>

In shared workbook in advanced tab it has following options. Based on end user selection changes are applied on shares workbook.

1. Either keep the history for certain period or don’t keep the history on shared workbook.

2. On share work Save changes on period schedule (automatically update) or just see other user changes.

3. Before changes are made for share workbook either prompt for save option or last modified saved.

4.  Printer review and filter setting for personal view.

8 0
3 years ago
Read 2 more answers
Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
Artist 52 [7]

Answer:

Please check the attachment.

Explanation:

The adjacency matrix is the matrix that has nodes as rows and columns. The nodes if connected is stated as 1 or else 0. And the adjacency list representation is the list with nodes and connected nodes. The nodes that are not connected are not being listed. The diagram and list as well as matrix can be found in the attachment.

4 0
3 years ago
David Rosen is credited with the development of which of these games?
nikklg [1K]
David Rosen is the CEO and lead programmer of Wolfire games. some of their games include Overgrowth, Desperate Gods, and Receiver.
4 0
3 years ago
Protocol 2 - Check for Errors
Lapatulllka [165]

Please note that the Problem to be solved from Protocol 1 is not provided hence the general answers. To construct and send, open a network environment a single multi-packet message, simply click "Add Packet" and then click "Send at Once".

<h3>How will the receiver know the order of the packets or if any are missing?</h3>

If the text or message sent does not make any reading sense, or if certain words are jumbled and out of place, then it is clear that something is wrong.

If the messages arrive in a coherent fashion, then the packet was fully received.

<h3>How will the receiver request missed packets and what will the sender do in response?</h3>

Where the users are familiar with the Transmission Control Protocol, lost packets can be detected when there is a timeout. Lost packets are referred to as Dropped packets.

Learn more about Packets at:
brainly.com/question/17777733

7 0
1 year ago
What is full form of RAM??? ​
stepladder [879]

Answer:

Random Access Memory, it's used to store working data and machine codes

Explanation:

Hope it helped !
Adriel

7 0
2 years ago
Read 2 more answers
Other questions:
  • To join two or more objects to make a larger whole is to _____________ them.
    8·2 answers
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • List at least three benefits of automated testing?
    13·1 answer
  • Anyone wanna play among us UwU code is TAEQPQ
    15·2 answers
  • You have just installed a new sound card in your system, and Windows says the card installed with no errors. When you plug up th
    5·1 answer
  • It is possible to limit the search results to a range of publication dates.
    13·1 answer
  • Quired to the weight
    12·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • Goals of the project objectives
    6·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!