1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
6

Without protocols the information sent and received through the Internet would never reach its intended target and even if it di

d, the message would be a jumbled mess. Review the lists below and select the one that correctly lists each protocol with its function.
A. TCP/IP identifies the resource requested DNS uses a "handshake" to relay packet information HTTP translates the name of a web server to a valid IP address
B. DNS identifies the resource requested HTTP uses a "handshake" to relay packet information TCP/IP translates the name of a web server to a valid IP address
C. TCP/IP identifies the resource requested HTTP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address
D. HTTP identifies the resource requested TCP/IP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address
Computers and Technology
1 answer:
Leokris [45]3 years ago
3 0

Answer:

HTTP identifies the resource requested TCP/IP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address

Explanation:

HTTP (HyperText Transfer Protocol). HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more computers to communicate. Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

You might be interested in
What are the most common types of cables in a network?
Maru [420]

the most common are twisted pair, coaxial, Ethernet cross over, and fiber optic.

4 0
3 years ago
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
amm1812

Answer:

Option (A) is the right answer.

Explanation:

According to the scenario, the user system is giving the error of invalid certificate while other users on the same network do not report any error, which means that there is some problem in a particular system.

Date and time can also be one of the main cause of this error because wrong date and time creates problem in surfing many websites by giving certificate error.

Hence the most appropriate answer is option (A).

While other option are wrong because of the following reasons:

  • UEFI boot mode is mainly used in booting the operating system and has no connection with network.
  • Logon time is also wrong because if the problem is with the login server, it can not give certificate error.
  • User access control is also not correct because it is used to control the access of the user.
7 0
3 years ago
Prevent a page break in the final paragraph of this document by keeping the lines together
sineoko [7]

Answer:

1. Place your cursor in the General Provisions section towards the finish of the archive.  

2. On the Page Layout tab, in the Paragraph gathering, tap the Paragraph Dialog Box Launcher and afterward tap the Line and Paragraph Breaks tab.  

3. Select the Keep lines together checkbox and snap Ok.  

Explanation:

In a short report or one that doesn't require a complex navigational structure, you can without much of a stretch configuration words and sections so key focuses emerge and the structure of your record is clear. You can accomplish sensational by applying predefined Word Art content impacts. To keep the presence of reports and other Microsoft Office records steady, you can organize archive components by applying predefined sets of designing called styles. Moreover, you can change the textual styles, hues, and impacts all through a record with a single tick by applying a subject.

7 0
3 years ago
What is the range of the well-known ports used by tcp and udp?
melamori03 [73]
/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.
8 0
3 years ago
Jake was working on an essay for his English class on a stormy Sunday afternoon. Before he could save his document, a big strike
matrenka [14]

Maybe in atosave, Computers mostly save what your working on :3

8 0
3 years ago
Other questions:
  • The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
    14·1 answer
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • Which statement best describes the purpose of the Insert Function dialog box?
    13·1 answer
  • How does the teacher know you have completed your assignment in Google Classroom?
    12·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • What is the ls option to list entries by lines instead of by columns?​
    11·1 answer
  • Anyone trying to play fortnite ? im bored lol
    6·2 answers
  • What is output?<br> x = 2<br> y = 3<br> print (x * y + 2)<br> 4<br> 2<br> 8<br> 10
    7·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!