1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
5

Which method of the form passes data without appending the parameters to the url?

Computers and Technology
1 answer:
vaieri [72.5K]3 years ago
5 0

Answer:

POST

Explanation:

Form data can be passed using GET or POST.

When the form data is passed using the GET method, the data gets appended to the query-string which is a part of the extended url. However this can cause a problem in scenarios where the number of parameters is large or  exposing the parameters via url represents a security breach. In such cases we can use the POST method of passing form data where the parameters are passed as key value pairs as part of the HTTP Request and the url is not impacted.

You might be interested in
How long does it take a letter to arrive?
viktelen [127]
Depends on who yourmail carrier is traffic weather how much mail they have
5 0
3 years ago
A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protoc
masya89 [10]

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

6 0
3 years ago
in cell h5, enter a formula that will calculate the percentage of attendees that went to the Altamonte springs job fair in 2018.
xz_007 [3.2K]
Formula is 

 = (a/b)(100)
8 0
3 years ago
Read 2 more answers
Which of the statements below explains why a budget is useful
Papessa [141]

The answer is D. All the other answers describe what a budget CAN be like, not necessarily what it is for everyone, if that makes sense.

8 0
3 years ago
What are the importance of computer software​
Katen [24]

Answer:

It controls and coordinates all hardware and software functions within your PC. It is designed to be ever-improving so that newer tasks are performed more efficiently.

4 0
2 years ago
Read 2 more answers
Other questions:
  • What is the output of this code? import java.util.HashSet; class A { public static void main(String[ ] args) { HashSet set = new
    15·1 answer
  • How do i know if i got flash installed onchrome
    5·1 answer
  • X=10 ;
    14·1 answer
  • You
    15·2 answers
  • You suspect that an attacker has hidden files on your machine. What Linux command would you use to search for files with a file
    14·1 answer
  • Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address
    7·1 answer
  • Logical address is generated by,
    13·1 answer
  • 9. DIMMs used in servers can provide additional reliability if they use what specific technology.
    8·1 answer
  • Việc áp dụng khai báo hải quan điện tử có áp dụng chữ ký số, đem lại những lợi ích gì
    10·1 answer
  • Please answer that and i'll gave you branlliest
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!