1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
6

When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the

IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?
A. HTTP
B. TCP/IP
C. DNS
D. HTML
Computers and Technology
2 answers:
mote1985 [20]3 years ago
8 0

Answer:

DNS

Explanation:

scoundrel [369]3 years ago
7 0

Answer:

The correct answer to the following question will be C. DNS.

Explanation:

DNS stands for Domain Name System, users able to find any information with the help of the domain name. Each and every device which are connected to the internet has there owned IP address, DNS is a system used to translate the domain names into the IP address so it will find the information or browsers can load the resources of the internet.

So by entering the domain name instead on an IP address can also browse the information for any user. And other options like HTTP (Hypertext transfer protocol), HTML (Hypertext markup language) and TCP/IP (Transmission control protocol / Internet protocol) can't help any user for accessing the work done by the DNS.

You might be interested in
What is a column in a table
serious [3.7K]

Answer: The columns in a table are the set of facts that we keep track of about that type of object.

Explanation:

5 0
3 years ago
Read 2 more answers
What privacy risks do new technologies present,<br> and how do we decide if they're worth it?
vredina [299]

Answer:

Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas

Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?

Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…

En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..

Explanation:

6 0
2 years ago
What is one way you can learn about your digital footprint?
Pie

Answer:

Information could be gathered using cookies, which are small files websites store on your computer after your first visit to track user activity.

Explanation:

3 0
2 years ago
Consider this binary search tree:______.
Nitella [24]

Answer:

The new root will be 2.

<em></em>

Explanation:

The binary tree is not properly presented (See attachment)

To answer this; first, we need to order the nodes of the tree in a pre-order traversal.

We use pre-order because the question says if something is removed from the left child.

So, the nodes in pre-order form is: 14, 2, 1, 5, 4, 16.

The root of the binary tree is 14 and if 14 is removed, the next is 2.

<em>Hence, the new root will be 2.</em>

7 0
2 years ago
Write a MIPS assembly language program that
8_murik_8 [283]

Answer:

123456789098765432

Explanation:

asdfghjklokjhgfdsasertyujn nbgfdfvbnjujhgvfcdec vgfredfghjmk

5 0
3 years ago
Other questions:
  • Which sparkline type is best for displaying trends in data changes over time?
    11·1 answer
  • What is the voltage drop across R4 in the diagram shown above?
    13·1 answer
  • :If a process terminates, will its threads also terminate or will they continue to run? Explain your answer.
    14·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges beca
    14·1 answer
  • What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
    6·1 answer
  • Create a list called courses containing the names of your current courses.
    9·1 answer
  • Please help me please please
    14·2 answers
  • What happens when you restrict someone on messenger?.
    12·1 answer
  • Write the icon of full justification​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!