1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
6

Without protocols the information sent and received through the Internet would never reach its intended target and even if it di

d, the message would be a jumbled mess. Review the lists below and select the one that correctly lists each protocol with its function.
A. TCP/IP identifies the resource requested DNS uses a "handshake" to relay packet information HTTP translates the name of a web server to a valid IP address
B. DNS identifies the resource requested HTTP uses a "handshake" to relay packet information TCP/IP translates the name of a web server to a valid IP address
C. TCP/IP identifies the resource requested HTTP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address
D. HTTP identifies the resource requested TCP/IP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address
Computers and Technology
1 answer:
Leokris [45]3 years ago
3 0

Answer:

HTTP identifies the resource requested TCP/IP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address

Explanation:

HTTP (HyperText Transfer Protocol). HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more computers to communicate. Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

You might be interested in
WHAT DO I DO IN MY FREE TIME????
yanalaym [24]

Answer:

what do u mean

Explanation:

7 0
3 years ago
Read 2 more answers
5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour,
MakcuM [25]
Well the awnser that you are looking for is not here and I am verry sorry about that I just need points for my awnser
5 0
3 years ago
Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
My name is Ann [436]

Answer:

def main():

   # Accept data from the user

   n=int(input('Enter the value of n:'))

   k=2;

   sum=0

   print('The list of the prime numbers are as follows:')

   # This loop runs from k to n

   while k<=n:

       # Call is_prime() method,

       # to check whether k is a prime or not

       sum=sum+is_prime(k)

       k=k+1

   print('Sum of the prime numbers:',sum)

# is_prime() Method

def is_prime(k):

   prime=0        

   i=1

   # Check k is a prime or not

   while i<=int(k):

       # Find the factors of k

       if (k % i) == 0:

           prime=prime+1

       i=i+1

   # If k as two factors

   if(prime==2):        

       print(k)

       return k;

   # If k as more than two factors

   else:        

       return 0;

# Call the main() method

main()

Explanation:

5 0
3 years ago
Which of the following statements is true of offshore outsourcing?a. Improved telecommunication systems have increased its attra
irinina [24]
Jansjsfajhabsbsbsjs. Hbabajajajajanakslsk. Jshsbsjshsbshdjshjd ds
5 0
3 years ago
Read 2 more answers
Next
DIA [1.3K]

Answer:

integrity

is acting consistently according to one's values and principles.

3 0
2 years ago
Other questions:
  • HELP!!!! I need this ASAP
    9·1 answer
  • To create smartart, switch to the insert tab and use a button in the ____ group.
    12·1 answer
  • What is an image that you can apply to another image to add detail and texture?
    6·1 answer
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • In which of these places might you be most likely to find a peer-to-peer network? On the Internet In a hospital In a home In a l
    5·2 answers
  • For the client-server application over TCP, why must the server program be executed before the client program? For the client se
    13·1 answer
  • Why is it necessary to understand conflict of interest and how it could affect you at work​
    7·1 answer
  • Create a subclass of Person called Lecturer that has 2 variables of its own: employeeNumber and salary. As in the above scenario
    12·1 answer
  • If you have 60fps on your laptop tell me one way you can go to 240fps
    14·2 answers
  • Given two integer arrays, largerArray with 4 elements, and smallerArray with 3 elements. What is the result after this code exec
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!