1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
11

Consider the folloeing website URL:http://www.briannasblog.com. What does the "http://" represent?

Computers and Technology
1 answer:
Alex Ar [27]3 years ago
6 0

i believe the answer would be (A) because HTTPS stands for Hypertext Transfer Protocol


You might be interested in
Decision making process
Zanzabum
Choice is the answer you want 
7 0
3 years ago
Which of the following is not true about designing classes? In order for class information to be printed instead of a memory add
Leokris [45]
'<span>All methods should be declared private</span>' is not true for classes. One should be able to change the properties of objects, and to do this safely and in a controlled manner, some public methods are declared. Some private methods can also be declared for more potentially sensitive operations for being called from within the class. 
6 0
3 years ago
Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
cestrela7 [59]

Answer:

(A) 1

Explanation:

In UNIX the file system the file system is a central part of the operating system. The file system is for storage and retrieval of information. Programs that form the UNIX system also stores information in files.

UNIX file systems supports three files namely: ordinary file, directory files, device files or special files.

If we need to access bytes 2500-2503 it means the bytes are within the third block. So we will need only one access.

Note this is because the file control block (inside) is within the memory. If file control block was not in the memory we would have needed more disk accessses.

7 0
3 years ago
Which individual of the following would be most likely to be directly concerned with web security?
prohojiy [21]
Network Engineer is correct.
4 0
3 years ago
Read 2 more answers
Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri
Schach [20]

Answer:

Option b, Option c, and Option d  are the correct options.

Explanation:

While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.

4 0
4 years ago
Other questions:
  • Dialogue is not a characteristic of functional text because
    9·1 answer
  • Which of the following statements are true regarding Steve Jobs and Steve Wozniak? Select 3 options.
    5·2 answers
  • Computer architecture:
    6·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • 20. A computer freezes at odd times. At first, you suspected the power supply or overheating, but you have eliminated overheatin
    6·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/python
    11·1 answer
  • A company Digicom Parts manufactures 2 types of unique products for laptop and desktop computers. It manufactures 10 types of la
    15·1 answer
  • It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!