1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
6

Suppose that you are developing an application in which you want to connect to a server to upload some data. You create a socket

(UDP or TCP) to establish communication with the server. In doing so, you need to specify information that identifies what server, and what application on that server, you want to connect to. You need to specify at least 2 of the following, which ones?
a.The server's IP address or hostname.
b.The server's operating system.
c.The HTTP version used by the server.
d.The port number for the application on that server
Computers and Technology
1 answer:
miskamm [114]3 years ago
4 0

Answer:

a.The server's IP address or hostname.

d.The port number for the application on that server

Explanation:

We can point out that a socket is a tool which contains or which comprises of a pair of value.

Also a socket is an end point which identifies each other. In this case the client connecting to the server.

From the options a and d meets the criteria.

You might be interested in
The class at the top of exception class hierarchy is ..........................
Lynna [10]

Answer:

<u>B) Throwable</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are a wide range of classes on the exception class hierarchy. All the way on the top is the Objects Class but since that is not an available answer we will move on to the next one. The next one is the <u>Throwable</u> class. therefore that is the answer.

**Exception is after Throwable , and Arithmetic Exception is at the bottom.... everything is a class so that is not a part of the hierarchy **

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
Which of these are examples of data sources? Check all that apply.
Rama09 [41]

Answer: databases, electronic archives, online libraries, spreadsheets (B,C,E,F)

Explanation: I just took the test :)) hope u have a great day and remeber u are beautiful <3

4 0
2 years ago
Read 2 more answers
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Sergeu [11.5K]

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

6 0
3 years ago
In a game with three frames, where will the objects on Layer 1 appear?
Ivan
It’s between d or c
6 0
3 years ago
Read 2 more answers
Other questions:
  • What does an approved project summary document indicate?
    13·1 answer
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • A computer processor can become extremely hot and must be cooled. A heat sink is placed on top of the processor to extract its h
    13·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • If a user inserts a piece of clip art over some text but does not want the art to block the text, the user should select
    14·2 answers
  • In C, a switch construct can have ________ number of default case(s). *
    14·1 answer
  • Anyone wanna join my giggl?
    11·2 answers
  • Sebutkan contoh komputer analog, komputer digital, dan komputer hybrid
    9·1 answer
  • I have all of the points and brainliest, but it won't level up, I don't know why, anyone know why?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!