1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
11

Web-based applications are application software which operate and can be accessed through _____________. The World Wide Web Stor

age hardware devices Desktop applications Intranets
Computers and Technology
2 answers:
sergejj [24]3 years ago
8 0

Answer:

a web browser

Explanation:

A web based application can be accessed over a network connection usually using a HTTP link, it doesnt have to necessarily be in a device memory.

bearhunter [10]3 years ago
4 0

a web browser i think

You might be interested in
HIPAA protects which of the following kinds of data?
Gelneren [198K]
The answer is a i looked up the question and it says a
5 0
3 years ago
Read 2 more answers
A server needs to connect directly to the Internet. The ipconfig/all command shows that the server has been auto-assigned the IP
Deffense [45]

Answer:

Link-local address

Explanation:

IP addresses that have "FE80" as the hexadecimal representation of their first 10 bits are IPV6 reserved addresses for link-local unicast addressing. These addresses are automatically configured (though may be manually configured too) on any interface and should not be routed. They are used for addressing on a single link with the main aim, among others, of automatic configuration and routing protocol advertisement. Devices attached to this link can be accessed or reached using the link-local addresses as they don't need a global address to communicate.

However, routers will not forward datagram or packets using link-local addresses. In other words, routers are not allowed to connect to the internet using the unicast link-local addresses.

8 0
3 years ago
Cisco cyber security would classify this email?
Nookie1986 [14]

Cisco cyber security would classify this email as security threats.

<h3>How do Cisco cyber security classify email security threats?</h3>

They classify them as:

  • Malware Delivery via Spam.
  • Credential Theft
  • Business Email Compromise, etc.

Note that in the case above, Cisco cyber security would classify this email as security threats

Learn more about Cisco from

brainly.com/question/23388335

#SPJ12

8 0
2 years ago
What is redundancy? What problems are associated with redundancy?
Anarel [89]

Answer:

Redundancy is the mechanism that occurs in database's data as the same data is stores in the multiple location.It creates repeated data by accident or for backup purpose.

The issues that arise due to the redundancy of the data is the storage space in database gets consumed and thus wastes the space in storing information in multiple locations.When any update occurs in the stored data's field value , it also has to be changed in the multiples occurrences.

5 0
3 years ago
What does the W in WAN represent
Ilya [14]
WAN stands for Wide Area Network.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb
    7·2 answers
  • What bit position in an ascii code must be complemented to change the ascii letter represented from uppercase to lowercase and v
    14·1 answer
  • Don't pat any attention to this
    7·2 answers
  • Why Unicode is the standard way of converting binary to text?
    8·1 answer
  • What is the role of the osi application layer? provides control of all the data flowing between the source and destination devic
    5·1 answer
  • - Explain the Windows User Authentication process for Client connecting to the domain
    11·1 answer
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • What does it mean for a heap to be complete?
    7·1 answer
  • Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for th
    13·1 answer
  • Give an idea of a law u would like to create
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!