1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
4 years ago
10

Plz help ( which is an example of a good URL?

Computers and Technology
2 answers:
Simora [160]4 years ago
8 0

The answer is B because it is short and simple and gets you to the point

Vedmedyk [2.9K]4 years ago
3 0

Answer:

i think its B because It looks like it would be something you might see in the URL bar

Explanation:

hope this helps im doing the test right now so ill tell you when im done also i have edmentum too so ill think well be great friends.

You might be interested in
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed
ludmilkaskok [199]

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

8 0
3 years ago
The second finger on the left hand types _____.<br><br> 3 E D C<br> 1 Q A Z<br> 7 U J M<br> 8 I K ,
hram777 [196]
The first finger on the left (Index) is choice "2" (1,Q,A,Z)

The second finger on the right (Middle) is choice "4" (8,I,K)

The first finger on the right (Index) is "3" (7,U,J,M

Which leaves choice "1" (3,E,D,C)

Hope this helps
7 0
4 years ago
Read 2 more answers
What does RoHS stand for and why is RoHS compliance important?
gladu [14]

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

8 0
3 years ago
What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with
ANEK [815]

Answer

Address masquerading technique.

Explanation:

Address masquerading

8 0
3 years ago
python Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as
Veronika [31]

Answer:

The following are the program in the Python Programming Language.

#get input from the user

val = input("Enter the value: ")

#split the input values

x=val.split()

#declare and initialize two variables to 0

total, l = 0,0

#set for loop

for n in x:

 #coverting into string

 n = int(n)

 #perform addition

 total= total + n

 #check that is l is none or n is greater than l

 if(l is None or n > l):

   #initialize the value of n in l

   l = n

#print the following output

print("Average and maximum value are:", total // len(x), l)

<u>Output</u>:

Enter the value: 10 20 0 5

Average and maximum value are: 8 20

Explanation:

<u>Following are the description of the program</u>.

  • Firstly, declare a variable 'val' in which we get string type input from the user.
  • Again declare two variables and assigned them to 0.
  • Then set the for loop statement, in which we convert the string variable into the integer and perform addition with those converted values. Set the if conditional statement to check that if the variable 'l' is none or 'n' is greater than 'l ' then, assigned the value of the variable 'n' in the variable 'l'.
  • Finally, print the following result with message.
8 0
4 years ago
Other questions:
  • What are the advantages and disadvantages of the simulated link strategy?
    11·1 answer
  • To use an imported image, simply drag it from the desktop onto the stage. true or false?
    14·1 answer
  • Try making a character (string) variable and a logical variable . Try creating a variable with a "missing" value NA. You can cal
    11·1 answer
  • What is the output from this program? #include void do_something(int *thisp, int that) { int the_other; the_other = 5; that = 2
    8·1 answer
  • Can someone that been helping me answer one more question for please and thx
    13·1 answer
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • A(n) ______ network is a system that attempts to imitate the behavior of the human brain. Group of answer choices advanced neura
    14·1 answer
  • List the three control problems associated with competingprocesses and briefly define each.
    7·1 answer
  • Discuss one simple example of hybrid computer.​
    15·1 answer
  • Can someone help me with python
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!