1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
13

What is the protocol in the web search at the bottom?

Computers and Technology
1 answer:
klasskru [66]3 years ago
3 0
(D) HTTP, or hyper-text transfer protocol, is the standard or set of rules that governs how web pages are sent over the internet.
You might be interested in
It is 10PM and you are inside in the middle of a large building. Your cell phone is dead so you cannot use wifi or cell signals
kupik [55]

<em>The answer is: your GPS unit cannot send signals to the satellite when it cannot reach it by line of sight. </em>

<em> </em>

<em>GPS signals are based on frequencies that can be blocked by solid objects (like walls and roofs). A GPS device is using a series of satellites to detect and see where it is physically located. These frequencies are sent from these plates (satellites) and we cannot expect it to go through all kinds of barriers. When you use a GPS inside a building, a wide variety of physical barriers and potential interference sources make it difficult for the device to detect your location accurately. </em>

<em> </em>

<em />

4 0
2 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
Computers can accomplish many tasks today, but there are still some things they cannot do. Think of some of the things you would
postnew [5]
Record our dream.
Since it is from the future and advanced, it is invalid to argue back that the wish to record our dreams cannot be fulfilled.

From here you can elaborate more ...
7 0
3 years ago
Suppose you want to sell your product to of one of the school canteen of El Salvador city thus you conducted study to one of the
Lyrx [107]

The interpretation of the table is that it shows that 45.12 percent of the respondents are in 16 years of age when likened to 12.20 percent who are 19 years old and 18.29 percent that are in 18 years of age.

<h3>What is the table about?</h3>

The table is one that shows the age profile for Filipino children from 0 to 4 years and above to 19 years,

Note that it is also made up of the largest age group making up from 10.1 to 10.7 percent as seen on the Philippine Statistics Authority (PSA).

Therefore, students that are in 16 years of age will have the ability to take in or consume products more than the older students as seen in El Salvador City.

Learn more about product  from

brainly.com/question/10873737

#SPJ1

4 0
2 years ago
1. Create an anonymous block that will count the number of students whose gr_t1 grade is higher than the average on gr_t1 and di
sweet [91]

Answer:

The Anonymous Block will be:

 1 DECLARE

 2  

 3  lv_grade_row grade%rowtype;

 4  lv_gr_avg grade.gr_t1%type;

 5  lv_std_name varchar2(80);

 6  cursor cursor_grade is select * from grade;

 7

 8  BEGIN

 9

10  select avg(gr_t1) INTO lv_gr_avg from grade;

11  open cursor_grade;

12  fetch cursor_grade INTO lv_grade_row;

13

14  while cursor_grade%found loop

15

16  if

17  lv_grade_row.gr_t1>lv_gr_avg then lv_std_name :=  

lv_grade_row.std_fname|| ' ' ||lv_grade_row.std_lname|| ' ' ||

lv_grade_row.gr_t1;

18  dbms_output.put_line(lv_std_name);

19

20  end if;

21  fetch cursor_grade into lv_grade_row;

22

Explanation:

4 0
3 years ago
Other questions:
  • Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha
    13·2 answers
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • Write the steps for displaying multiple subtotal functions in excel.
    10·1 answer
  • What are the advantages of AI?????
    9·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·1 answer
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • Computer can do work very___​
    7·2 answers
  • PYTHON:Given the dictionary, d, find the largest key in the dictionary and associate the corresponding value with the variable v
    12·1 answer
  • Add me on Fortnite. Epic is smashman892. *Ik it sux but it's an old account* Comment ur epic
    6·2 answers
  • QUESTION 5
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!