1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
4 years ago
12

What does the https in a link stand for?

Computers and Technology
2 answers:
ExtremeBDS [4]4 years ago
5 0
<span>HTTPS stands for Hypertext Transfer Protocol Secure</span>
Serjik [45]4 years ago
4 0
Https: Hyper Text Transfer Protocol Secure. 
basically means that the connection between your browser and website is secure and encrypted. 
You might be interested in
Write a java program.
Sliva [168]

Answer:

The source code has been attached to this response. It contains comments explaining each line of the code. Kindly go through the comments.

To run this program, ensure that the file is saved as ArithmeticProcessor.java

Keep editing line 7 of the code to test for other inputs and arithmetic operation.

A sample output has also been attached to this response.

6 0
3 years ago
"a web client that connects to a web server, which is in turn connected to a bi application server, is reflective of a"
Bingel [31]

The web client that connects to a web server, which is in turn connected to a bi-application server, is reflective of a one-tier architecture.

<h3>What is a website?</h3>

A website is a collection of web pages and related material that is published on at least one server and given a shared domain name.

A one-tier architecture is reflected in the web application that connects to a web server, which is coupled to a bi-application server.

Thus, the web client that connects to a web server, which is in turn connected to a bi-application server, is reflective of a one-tier architecture.

Learn more about the website here:

brainly.com/question/19459381

#SPJ4

8 0
2 years ago
The information in DNA Is coded in chemical bases adenosine (A) guanine (G) cytosine (C), and thymine (T) We can represent a DNA
Elanso [62]

Answer:

c

Explanation:

i think i leard it out my old shcool

4 0
3 years ago
Place the stages of teamwork in the correct order and describe what occurs in each.
Phantasy [73]
Pretty sure we need a picture
5 0
4 years ago
Explain the security mechanisms available for a database and how the data will be protected.
Stolb23 [73]

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

8 0
3 years ago
Other questions:
  • The ____ contains methods that allow you to set physical properties such as height and width, as well as methods that allow you
    14·1 answer
  • I just started game development using unity, I’m trying to control my sphere moving on a flat surface using the W,A,S,D keys, if
    11·1 answer
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • ​this is another name for the wireless configuration in which a central wireless device is used to serve all wireless clients.
    13·1 answer
  • Increasing your margins will increase the amount of space you have to type text on your document. Please select the best answer
    10·1 answer
  • 1. Which of the following statements are true about routers and routing on the Internet. Choose two answers. A. Protocols ensure
    9·2 answers
  • Omar sends a PDF file to his teacher. He then prepares another copy of the presentation that includes only the slides he wants t
    11·1 answer
  • 11.6 Code Practice edhesive
    11·1 answer
  • When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) addr
    5·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!