1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
10

Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtml

Computers and Technology
2 answers:
storchak [24]3 years ago
6 0

HTTP means Hyper Text Transfer Protocol underlying protocol used by the World Wide Web(www).

usa is the server name which is used address in the DNS record

.gov is the Domain names which  are used to identify more then one IP addresses

Agencies/federal.shtml a directory is a collection of file resources also called the resource ID.

Alika [10]3 years ago
4 0

Answer:

1. http = protocol

2. usa = server name

3. .gov = domain name

4. Agencies/federal.shtml = resource ID

Explanation:

You might be interested in
Complete the sentence. <br><br> ____ Is the study and use of very small technology units
kondor19780726 [428]

Answer:

nanotechnology

Explanation:

I just took the test

3 0
4 years ago
Microsoft Edge offers a pane where you can access favorite webpages, open webpages saved to your Reading list, and view the hist
shutvik [7]

Answer:

Hub      

Explanation:

A Hub is a networking tool linking of the different devices or other networking devices.In comparison to router or other a Hub has not routing tables or the guidance where it will sends the information and transmits the data in the network in the respective link.

The hub is used in the Microsoft Edge that provides a panel where we can access favorite web pages. The hub is also used in the  history of the previously visited web pages .

7 0
3 years ago
What is Deep learning
vodomira [7]

Answer:

Deep learning is an AI function that mimics the workings of the human brain in processing data for use in detecting objects, recognizing speech, translating languages, and making decisions. Deep learning AI is able to learn without human supervision, drawing from data that is both unstructured and unlabeled.

3 0
3 years ago
Why is accessing a disk block expensive? discuss the time components involved in accessing a disk block. (?
Dahasolnce [82]

Answer:

Explanation:

A disk block works by transferring data between the disk and main memory units which are called the blocks, whose size can range drastically from 512 bytes to several thousand.  This data is converted to hardware-level cylinder, surface, and sector number  which makes accessing the data immensely slower than accessing data in the main memory. This time constraint is also the main reason as to why accessing a disk block is so expensive.

6 0
3 years ago
As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
aleksklad [387]

Answer:

Message

Explanation:

  • The Application layer creates a message. The Application layer passes the message to the Presentation layer.
  • The Presentation layer encapsulates the message by adding information to it. Information is usually added only at the beginning of the message (called a header); however, some layers also add material at the end of the message (called a footer)
  • The process of passing the message down and adding layer-specific information continues until the message reaches the Physical layer.
  • At the Physical layer, the message is converted into electrical impulses that represent bits and is transmitted over the physical connection.  
  • The receiving computer captures the bits from the physical connection and re-creates the message in the Physical layer.  
  • The Physical layer converts the message from bits into a Data Link frame and sends the message up to the Data Link layer.
  • The Data Link layer strips its information and sends the message up to the Network layer.
  • This process of deencapsulation is performed until the message reaches the Application layer.
  • When the message reaches the Application layer, the data in the message is sent to the intended software recipient.
5 0
3 years ago
Other questions:
  • Greg is writing a report on becoming an advertising and promotions manager. Complete the report by correctly filling in the miss
    12·1 answer
  • Defination of computer Software​
    7·2 answers
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • List the general steps that are used to configure a soho router and set up the network
    13·1 answer
  • What process combines data from a list with the content of a document to provide personalized documents?
    11·2 answers
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • Which describes the hypothesis of an experiment? the variable changed by the experimenter/ the quantity that must remain constan
    9·1 answer
  • Assuming that all of the table and column names are spelled correctly, what's wrong with the INSERT statement that follows?
    13·1 answer
  • 2. Which pattern microphone should Jennifer take to the press conference? Jennifer is a journalist with one of the leading newsp
    14·1 answer
  • Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the pr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!