1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
15

Which of the following URL extensions indicate the website is used by a college or university?

Computers and Technology
2 answers:
ExtremeBDS [4]3 years ago
7 0

The correct answer is (D) .edu

Explanation:

URL or Uniform Resource Locate refers to the set of words you use to locate a specific web page or the web address which is unique for each web page. Additionally, URL extensions refer to a section of URL that varies according to the web page's domain or type. In this way, "org" indicates the web page belongs to a non-profit organization while "mil" indicates the web page is from a military organization. In the case of web pages from colleges, universities and other education institutions this can be identified because they contain "edu" in their URL. Thus, the URL extension that indicates the website is used by a college or university is .edu.

Svetllana [295]3 years ago
4 0
The answer is (D) - .edu
You might be interested in
Which of the following items can you locate in a document using the navigation pane? Choose the answer.
Rashid [163]

Answer:

D: All of the above

Explanation:

4 0
3 years ago
Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
slega [8]

Answer:

C.

Explanation:

In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.

Thus, 1 - 3 - 4 - 2

Cheers

3 0
3 years ago
You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
BartSMP [9]

Answer:

a. Radom Access Memory (RAM).

Explanation:

If a computer user modifies a document that is saved on his or her computer. This changes are stored on the Radom Access Memory (RAM) until the computer user save the document.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

3 0
3 years ago
A nonpipelined system takes 300ns to process a task. The same task can be processed in a 5-segment pipeline with a clock cycle o
Vladimir79 [104]

Answer:

Pipelined architecture is 1.667 times more speedy than non pipelined architecture.

Explanation:

There are five stages to to complete an instruction to execute in pipeline architecture. as

Stage 1:  Instruction Fetch

Stage 2: Instruction Decode

Stage 3: Execute

Stage 4: Memory Access

Stage 5 : Write Back

The pipeline architecture processed instruction as given below. Each Stage take 1 clock cycle, which is represented as CC.

                Stage 1           Stage 2         Stage 3         Stage 4            Stage 5

I1:              1cc                  2cc                 3cc                4cc                   5cc

I2              2cc                 3cc                  4cc               5cc                   6cc

I3              3cc                  4cc                 5cc              6cc                    7cc

I4              4cc                 5cc                  6cc              7cc                    8cc

each four Instructions set takes 8 Clock Cycles.

I5              9cc                  10cc                11cc               12cc                 13cc

I6              10cc                 11cc                  12cc             13cc                 14cc

I7              11cc                  12cc                 13cc              14cc                 15cc

I8              12cc                 13cc                  14cc              15cc                16cc

.

.

.

I97:             193cc            194cc              195cc              196cc               197cc

I98             194cc             195cc             196cc               197cc               198cc

I99            195cc             196cc              197cc              198cc               199cc

I100         196cc                197cc             198cc            199cc                 200cc

<u>Pipelined architecture Time Calculation</u>

So in pipeline architecture 100 instructions takes 200 clock cycles to execute.

1 Clock Cycle time period is = 60ns.

200 Clock Cycle =  60ns * 200 = 12000 ns

<u>Non Pipelined architecture Time Calculation</u>

1 task Time period= 300ns

100 task time period = 100 * 300 =  30000 ns

The difference between pipelined and non pipelined architecture time period is = 30000 - 12000 = 18000 ns

<u>Speedup ratio</u>

<em>Speed up ratio= 30000/18000 =  1.667</em>

7 0
3 years ago
Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
denis-greek [22]
Either Word (Microsoft app) or Powerpoint (Microsoft app)
7 0
3 years ago
Other questions:
  • Consider the following definition of the recursive function mystery. int mystery(int first, int last) { if (first &gt; last) ret
    12·1 answer
  • Implement function bin2dec that takes a binary number bin_num as a string argument and prints out the corresponding decimal numb
    9·1 answer
  • Does white space have visual weight? Yes or No
    7·2 answers
  • Set screw compression and indenter are all types of
    13·2 answers
  • My father helps me more than helping my sister in Maths because I need more help to understand. This situation shows ___________
    11·1 answer
  • Consider the following code.
    7·2 answers
  • A financially stable person is able to:
    8·1 answer
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
  • What is a word processor write any five important features of word processor?
    15·1 answer
  • Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are some
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!