1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
8

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is

called the _____________________.
Computers and Technology
2 answers:
olga2289 [7]3 years ago
4 0

Answer:

HyperText Transfer Protocol HTTP is a protocol that is used to retrieve a Web page from a Web server.

Explanation:

HyperText Transfer Protocol is the protocol used by the World Web and determines the formation and transmission of the message and defines the actions of Web servers and browsers.

HTTP is the text-based protocol. Clients send a request to a web server for web pages. When the request is served, each connection is discounted. A new connection must be created.

It is a TCP/IP based protocol that is used to deliver data on the World Wide Web. Data contains

  • HTML files
  • images
  • queries.

It provides a way for the computer to communicate with each other.

lapo4ka [179]3 years ago
4 0

Answer:

HTTP (HyperText Transfer Protocol)

Explanation:

HyperText Transfer Protocol (HTTP) is a protocol used in the world wide web for dictating and defining how data and information are formatted and transmitted across a network. It also describes and specifies the set of actions  that web servers and browsers perform on these data. With the HTTP, client browsers (such as those of Macintosh) can retrieve web pages from web servers (such as Microsoft web server).

To retrieve these web pages, the client browser first makes a request via http to the server. Then, if the server understands the request and the requested web page is available and accessible, the server, as a way of responding, returns the web page to the requesting web browser.

The regular HTTP uses a port number of 80 while its more secure version (HTTPS) uses a port number of 443.

You might be interested in
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
3 years ago
What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets
bogdanovich [222]

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

5 0
2 years ago
Which of the following actions should you take when turning left at an intersection?
fomenos
The answer is B Okay good luck and dont...mess it up
8 0
3 years ago
What are some types of vehicle technology advancements?
julia-pushkina [17]

Answer:

D is the suitable answer.

Explanation:

All of the above

5 0
3 years ago
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
Scrat [10]

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

6 0
2 years ago
Other questions:
  • Have you ever used a device that relies solely on the cloud?
    10·1 answer
  • What folder holds 32-bit programs installed in a 64-bit installation of windows?
    12·1 answer
  • What type of device is the printer?
    13·2 answers
  • Fix the 2 error codes.
    14·1 answer
  • Write a java program which uses methods for calculating the sum of any 5 non-zero integer digits that are input. The program mus
    8·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • Can somebody help me out
    15·1 answer
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!