1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
6

Without protocols the information sent and received through the Internet would never reach its intended target and even if it di

d, the message would be a jumbled mess. Review the lists below and select the one that correctly lists each protocol with its function.
A. TCP/IP identifies the resource requested DNS uses a "handshake" to relay packet information HTTP translates the name of a web server to a valid IP address
B. DNS identifies the resource requested HTTP uses a "handshake" to relay packet information TCP/IP translates the name of a web server to a valid IP address
C. TCP/IP identifies the resource requested HTTP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address
D. HTTP identifies the resource requested TCP/IP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address
Computers and Technology
1 answer:
Leokris [45]3 years ago
3 0

Answer:

HTTP identifies the resource requested TCP/IP uses a "handshake" to relay packet information DNS translates the name of a web server to a valid IP address

Explanation:

HTTP (HyperText Transfer Protocol). HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more computers to communicate. Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

You might be interested in
In some employment situations, not all personnel can immediately evacuate a work area per the eap. it may be that some equipment
Anika [276]
I think the correct answer from the choices listed above is option A. These personnel are referred to as critical personnel. They are em<span>ployees who may remain to shut down critical operations before evacuating. Hope this answers the question. Have a nice day.</span>
8 0
4 years ago
2. What is the MOST common experience LGBTQ+ individuals share when accessing medical trea
denis23 [38]

Answer:

true on the last one

Explanation:

4 0
3 years ago
Why internet is helpful for ICT?​
insens350 [35]

Explanation:

Information & Communication Technology is an extended term for Information Technology. That stresses the role of unified communication & integration of telecommunications & computers as well as enterprise software, middleware, storage & audiovisual, that enables users to access, store, transmit & manipulate information. The term ICT is used to refer to the convergence of audio-visual & telephone networks with computer networks through single cabelling or link systems.

All the things that are happening nowadays are with the help of the Internet. From shopping, meetings, messaging, video conferencing, news and many more are happening just in single touch within a fraction of seconds you will know what's happening in the corner of the world, around the world, beyond the planet, you can communicate with anyone you want, you can purchase from where ever you want. This Internet has made this huge world like a small apple.

4 0
3 years ago
A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large compu
Taya2010 [7]
I think it'd be terminal concentrator.  A(n) terminal concentrator is a front - end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer. 
7 0
3 years ago
I am stuck on these 2 questions. Can someone help me please?
Debora [2.8K]

Answer:

My answer could not be submitted because of some signs and symbols in my solution.

So, I've added the answer and a comprehensive explanation as an attachment.

Note that the question is answered using Python programming language.

Explanation:

Lines that start with # are used to explain the program

<em>See attachment</em>

Download txt
5 0
3 years ago
Other questions:
  • Which type of engine has been used to power airships and/or dirigibles?
    13·1 answer
  • What is the subjects under artificial intelligence ?​
    15·1 answer
  • A thesaurus can be used to look up a (n) or word similar in meaning to a given word
    15·1 answer
  • What do people in japan use to make anime
    5·1 answer
  • Proofreaders' marks are:
    6·1 answer
  • Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular lan
    5·1 answer
  • The Quick Access tool bar allows you to customize the actions or commands you frequently use.
    13·1 answer
  • HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
    8·1 answer
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!