1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
4 years ago
12

What does the https in a link stand for?

Computers and Technology
2 answers:
ExtremeBDS [4]4 years ago
5 0
<span>HTTPS stands for Hypertext Transfer Protocol Secure</span>
Serjik [45]4 years ago
4 0
Https: Hyper Text Transfer Protocol Secure. 
basically means that the connection between your browser and website is secure and encrypted. 
You might be interested in
Which of the following correctly describes the reason for quality customer service?
Vera_Pavlovna [14]
The correct answer is C. Keep existing customers and clients
Explanation:
Customer service refers to the interaction with customers and support employees in a company provide to customer to guarantee he or she has the best experience when buying one product or service. A high-quality customer service implies providing complete information to customers, and helping them before, during, and even after their process in buying or looking for information in a company. The main purpose of this is that customers feel the support from employees, and are loyal to the company which means they will go back if they need the same service or products. Thus, the reason for quality customer service is "Keep existing customers and clients".
7 0
3 years ago
What defines a social search?​
Nimfa-mama [501]

Known or unknown information on any subject been searched in the website such as googe.com, bing.com, ask me.com, LinkedIn, Twitter etc.

<u>Explanation:</u>

End user will receive information (multiple links) on the same subject on internet browser.

End user has to read and understand the information and pick up the right information on their further studies.

All the website will have their or search engines to retrieve the information on social search. In other way it makes our knowledge easily to understandable version rather referring the books.

8 0
3 years ago
: Compute the 9 partial derivatives for the network with two inputs, two neurons in
lions [1.4K]

Using the python code we can say that it will be possible to calculate the neutrons and organize them as:

<h3>The code can be written as:</h3>

<em>def get_total_derivative(self,l_id):</em>

<em>def sigmoid(x, div = 0):</em>

<em>if div == 1: </em>

<em>return np.exp(-x) / (1. + np.exp(-x))**2.</em>

<em>if div == 2: </em>

<em>return - np.exp(x) * (np.exp(x) - 1) / (1. + np.exp(x))**3.</em>

<em>return 1. / (1. + np.exp(-x)) </em>

<em />

<em>def linear(x, div = 0):</em>

<em>if div == 1: </em>

<em>return np.full(x.shape,1)</em>

<em>if div > 2: </em>

<em>return np.zeros(x.shape)</em>

<em>return x </em>

<em />

<em />

<em />

See more about python at brainly.com/question/18502436

#SPJ1

8 0
2 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
icang [17]

Answer:

Tactic Exchange

Explanation:

The approaching style of the student to his/her friend for help is of an influence categorized as the "Exchange Influence Tactic".

The Exchange Influence Tactic refers to when a person persuades someone or seeks influence over him/her by offering some sort of reward for their help rendered. It might also work by reminding other person of any favor which you offered in the past that should be repaid now.

Here the student is seeking help of his/her friend for completion of a final report for which he/she is already late. In exchange the student is assuring his/her friend the completion of certain spreadsheets which are pending on him/her. Hence, the student has used the exchange tactic to get his work done by offering a favor in response.

3 0
4 years ago
Other questions:
  • Which element of the word program window contains buttons for saving a document and for undoing, redoing, and repeating a change
    5·1 answer
  • When communicating with a server on another subnet, which of the following settings is used to determine which direction it need
    6·1 answer
  • What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typic
    14·1 answer
  • Why won’t my Nintendo Switch connect to the internet?
    7·1 answer
  • How do i get the schools admin password for the good wifi
    10·2 answers
  • Which of the following organizations offers a family of business management system standards that details the steps recommended
    12·1 answer
  • The problem analysis phase typically includes which of the following tasks? (Points : 2) Negotiate baseline scope.
    10·1 answer
  • What are two tasks that need to be done to a hard drive before operations can use it
    11·1 answer
  • Long Answer Questions: a. Briefly explain the types of Control Structures in QBASIC.​
    5·1 answer
  • Which of these is an example of collective voice?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!