1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
3 years ago
9

A computer that delivers requested webpages to your computer or mobile device is a(n) _________.

Computers and Technology
1 answer:
Zinaida [17]3 years ago
6 0
Web server, probably.
You might be interested in
What is the benefit to displaying the merge codes in a document? There is no advantage to showing these codes. The recipient of
IgorC [24]

Answer:

The author will know where data will be inserted in the document.

Explanation:

A method of taking data from a database,  spreadsheet, or other form of structured  data, and inserting it into documents such  as letters, envelopes and/or mailing labels.

5 0
3 years ago
Read 2 more answers
What type of lens was used to take this picture?
Leona [35]

Fish-eye because this is how you would see through a "fish eye" point of view in a rounded tank that is commonly used.

May I please have brainliest

4 0
4 years ago
What was designed as an area where computer vendors could store data that is shielded from user activities and operating system
Nataliya [291]

Answer:

host protected area

Explanation:

7 0
3 years ago
If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, ho
Rzqust [24]

Answer:

explanation below

Explanation:

Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected.  These controls are not only used by managers but can be exercised by selected users.  

These controls must be put in place to cover all forms of information security, physical security and classification of those information.  

5 0
3 years ago
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availabil
Mars2501 [29]
If I'm not mistaken firewalls should be enough as now the automatically  back up all data
4 0
3 years ago
Other questions:
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their
    11·1 answer
  • Do you think boot-camp-style treatment centers can help young. People kick smartphones addictions?
    14·2 answers
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • What is the difference between line art and continuous tone copy?
    14·1 answer
  • WILL UPVOTE <3
    9·1 answer
  • A computer can function in the absence of software true or false​
    15·2 answers
  • Assume phrase= "Peter Piper picked a peck of pickled peppers", What will be returned if phrase.search(/[aeiou]/) is called?
    9·1 answer
  • Primary technology skills are skills that are necessary for success in online education
    9·2 answers
  • Which is the best response to receiving a threating text from a classmate
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!