1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
14

________ is a set of rules for exchanging files such as text, graphic images, sound, video, and other multimedia files on the we

b.
Computers and Technology
1 answer:
Soloha48 [4]3 years ago
3 0
<span> HYPERTEXT TRANSFER PROTOCOL  (HTTP)</span>
You might be interested in
Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
klio [65]

Answer:

A. To decide what types of products it should make

Explanation:

8 0
3 years ago
___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
natta225 [31]

Answer:

Layered security

Explanation:

Layered security is a multiple layers defense practice used to protect resources and data. One goal of the layered security is to create redundancies or also known as backups to face the situation that one or more of the security measures in the outer layer fail or are bypassed, at least the resources and data still get protected by inner layer security. The number of security layer set for the resources is dependent on how important the resources are.

3 0
3 years ago
There was a thunderstorm in your area and the power is out. The traffic lights are not functioning. Explain what you should do w
nika2105 [10]

Answer:

STOP and check if it is safe to cross

Explanation:

6 0
3 years ago
Read 2 more answers
Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
____ [38]

Answer:

The answers are -

work on networks that include using Windows operating systems as well as Mac OS, NetWare, or UNIX

provide a graphical user interface that makes it easier for network administrators to learn the system

use wizards and setup devices as the user operating system, making it easier to set up network features

Explanation:

5 0
3 years ago
The box formed by the intersection of a row and column in a spreadsheet program is known as a ________.
andreev551 [17]

The spreadsheet software lets the user to perform calculations and numerical analyses.

The box formed by the intersection of a row and column in a spreadsheet program is known as a cell. In the cell you can enter a single piece of data.The data can be text, a numeric value, or a formula.


4 0
3 years ago
Other questions:
  • To create a digital file from an old photo, I would use a _____.
    10·1 answer
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • What is a short sequence of characters that appears at the end of a filename and is preceded by a period called __________
    5·1 answer
  • Which 3D game has Bentley the Bear collect gems while avoiding enemy trees, bees, ghosts, skeletons, and Berthilda the witch?
    9·1 answer
  • Hvhblfffffffff<br> eafafaefafsa
    9·2 answers
  • Which of the following statements best reflects the pros and cons of overtime potential for a line installer or repairer?
    15·1 answer
  • Fill this blanks with the given words​
    6·1 answer
  • Five plus six is equal to?​
    10·2 answers
  • Activity 1.1.4 What is Technology?
    10·1 answer
  • How do I get the pictures from my old Samsung phone to put on my iPhone? The Samsung is turned off. Is there a way to transfer i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!