1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
8

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is

called the _____________________.
Computers and Technology
2 answers:
olga2289 [7]3 years ago
4 0

Answer:

HyperText Transfer Protocol HTTP is a protocol that is used to retrieve a Web page from a Web server.

Explanation:

HyperText Transfer Protocol is the protocol used by the World Web and determines the formation and transmission of the message and defines the actions of Web servers and browsers.

HTTP is the text-based protocol. Clients send a request to a web server for web pages. When the request is served, each connection is discounted. A new connection must be created.

It is a TCP/IP based protocol that is used to deliver data on the World Wide Web. Data contains

  • HTML files
  • images
  • queries.

It provides a way for the computer to communicate with each other.

lapo4ka [179]3 years ago
4 0

Answer:

HTTP (HyperText Transfer Protocol)

Explanation:

HyperText Transfer Protocol (HTTP) is a protocol used in the world wide web for dictating and defining how data and information are formatted and transmitted across a network. It also describes and specifies the set of actions  that web servers and browsers perform on these data. With the HTTP, client browsers (such as those of Macintosh) can retrieve web pages from web servers (such as Microsoft web server).

To retrieve these web pages, the client browser first makes a request via http to the server. Then, if the server understands the request and the requested web page is available and accessible, the server, as a way of responding, returns the web page to the requesting web browser.

The regular HTTP uses a port number of 80 while its more secure version (HTTPS) uses a port number of 443.

You might be interested in
A scientific question may lead to a(n) , which can be tested.
kari74 [83]
A hypothesis or educated guess
6 0
4 years ago
Read 2 more answers
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
i was playing a mobile game and I was a guild leader in there. one of the members were very disrespectful and they just left bec
Sonbull [250]

Answer:

which mobile game? Whatever the worst thing you can do is. If its slurs and harassment or bullying report them

Explanation:

3 0
3 years ago
Read 2 more answers
you are a bank loan officer. carter has to come into your office and applied for a loan for a car.you ran his credit report, and
elena-14-01-66 [18.8K]

Answer:

Carter score falls within the range of scores, from 300 to 579, considered Very Poor. Score is significantly below the average credit score.

Explanation:

5 0
3 years ago
In powerpoint a point is _____ of an inch in height.
USPshnik [31]
 a fraction

I think it is correct.

Hopefully it helps.
6 0
3 years ago
Other questions:
  • How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
    6·1 answer
  • Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
    8·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • How do governments correct for negative externalities?
    5·1 answer
  • . When a function template has two parameterized types, one as the return value, and one as an argument, then _____.
    11·1 answer
  • What is internet?<br>what is online?​
    5·1 answer
  • Wrtie down some containerization technology.
    11·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • Zoe wants to use an image file that will allow her to preserve all of the original
    10·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!