1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
9

The ___ are documents which uses http ?

Computers and Technology
1 answer:
givi [52]3 years ago
5 0
The HTML is the answer
You might be interested in
The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
DaniilM [7]

Answer:

<em>The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems. Therefore, you will begin your report with a brief explanation of OS fundamentals and the types of information systems. </em>

Read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

  • Operating systems fundamentals

An operating system is the fundamental software which is needed to run a hardware every electronic hardware need an instruction set to make the hardware working. We can say that operating system is communication medium between the user as well other software to the hardware. Hardware don’t know the language of user and user don’t know the language of hardware how to give instructions to the hardware to perform some specific task so Operating system do this functionality to meet the needs of both user and hardware.

  •  The applications of the OS

Applications of operating system are following  

  • Security

Operating system make sure that all the user data is secured and an unauthorize source cannot access the computer to make any changes in user data or any other program.

  • Communication b/w application software and user

The other application of operating system is that it provides a communication channel b/w user and other application program by using some sort of compilers, interpreter to meet the user needs.  

  • File Management

Operating system also provide an essential feature of managing files. It provides complete directory and easy navigation of files and their usage access. It keeps track that where the information is stored and all other details that thing is known as file system.

  • Device Management  

Operating system also keep track of all the devices connected to it install their respective device drivers if available and make them available. OS do communication with the devices connected to it and then perform instructions via hardware and allocate which instruction set should be assign to which device.

  • Processor Management

OS control the multitasking feature of the processor. It makes an order of list of all the tasks which need to be done on processor and assign them according to there priority and also manage for how much time that task is assigned to the processor.

  • Error Detecting

OS keep track of all the information of the health of the computer and detect errors if available to avoid malfunctioning of the computer.

  • The Embedded OS

Embedded operating system are specially designed operating system which are used to for special purpose hardware/embedded system. These OS are more efficient than the simple OS and have limited features. They are designed to be compact and resource efficient. It perform real time operations and very responsive to the instructions. In our daily life ATM machine have an embedded OS, smart phones also have and in medical like MRI machine.  

  • Information system architecture

The information system is defined as formal definition of the business processes, product technologies and working system structure and other technical framework for a business organization. Information system architecture have four layers “Business Process Architecture”, “System Architecture”, “Technical Architecture” and “Product Architecture”.

Information system architecture consist of the software and hardware used to meet the consumer needs. It consists of a documented detail of software hardware used and networked and future plan to add some other features if needed to upgrade or change the system.

  • Cloud computing

Cloud computing is defined as on demand availability of computer resources over the network/internet like storage, software or processing without using the current system all the work is done on a system far away which is available on internet and can be accessed from anywhere. For such services there are data centers which store data on servers to make them available to there user.  

Cloud computing have some types like SaaS (Software as service), Storage, Database, Security, Platform as service.

4 0
3 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a, from a d
Alja [10]

Answer:

There is Name resolution failure

Explanation:

This normally occurs when the computer can't access the host (your server). It can be caused by several factors, such as:

-Internet connectivity is down

-The client does not have DNS servers configured or is configured with the incorrect DNS server IP addresses.

-The DNS servers are failing.

3 0
4 years ago
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
Xelga [282]

Answer:

import java.util.Scanner;

public class ListOfIntegers {

public static void main(String[] args) {

 // Create an object of the Scanner class to allow for user input

 Scanner input = new Scanner(System.in);

 // Prompt the user for the number of integers they want to enter

 System.out.print("Enter the number of integers : ");

 // Get and store the number of integers entered by user

 int n = input.nextInt();

 System.out.println();

 // Create an array to hold the integers

 // The array has the same length as the number of integers

 int[] numbers = new int[n];

 // Create a loop that asks the user to enter all integers

 // At each cycle of the loop, save the entered integer into the array

 for (int i = 0; i < n; i++) {

  System.out.print("Enter number " + (i + 1) + " : ");

  numbers[i] = input.nextInt();

  System.out.println();

 }

 // Prompt the user for the lower bound

 System.out.print("Enter the lower bound : ");

 // Get and store the lower bound in a variable

 int lowerbound = input.nextInt();

 System.out.println();

 // Prompt the user for the upper bound

 System.out.print("Enter the upper bound : ");

 // Get and store the upper bound in a variable

 int upperbound = input.nextInt();

 System.out.println();

 System.out.println("OUTPUT :: ");

 // Create a loop to cycle through the array of numbers.

 // At each cycle, check if the array element is within range.

 // If it is within range, print it to the console

 for (int j = 0; j < numbers.length; j++) {

  if (numbers[j] >= lowerbound && numbers[j] <= upperbound) {

   System.out.print(numbers[j] + " ");

  }

 }

}

}

Explanation:

Please go through the comments in the code for more readability and understanding. The source code file has been attached to this response. Kindly download the file to get a better formatting of the code.

Hope this helps!

Download java
7 0
4 years ago
Read 2 more answers
The algorithm will produce a different output depending on the specific secret key being used at the time. The exact substitutio
Paha777 [63]

Answer:

The answer is "Option A".

Explanation:

Step by step execution of any task is also known as algorithm, It is an easy way to solve any problem. The algorithm is used for software and statistical analysis, measurement and other similar activities.  

  • It is also used to solve complex problems in different ways, with particular cases attach to a new information item, search for a certain product, or form an item.
  • It depends on the particular private key, which is used in the time, that generates another output, which is the approximate replacement, and the transition of the dataset depends on the key.
5 0
4 years ago
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • A spreadsheet program of a computerized version of _______
    14·1 answer
  • If some alveoli cease to act in gas exchange ( due to alveolar collapse or obstruction by mucus, for example), the ___ is added
    13·1 answer
  • In python:
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly. Joseph is a digital media developer and has years of work experie
    15·1 answer
  • GUYS PLEASEEEE HELP !!!
    12·2 answers
  • Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions
    11·1 answer
  • Compute the acceleration of gravity for a given distance from the earth's center, distCenter, assigning the result to accelGravi
    12·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
  • Show the B-tree that results when inserting R,Y,F,X,A,M,C,D,E,T,H,V,L,W,G (in that order)branching factor oft= 3. You need only
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!