1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
4 years ago
6

When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the

IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?
A. HTTP
B. TCP/IP
C. DNS
D. HTML
Computers and Technology
2 answers:
mote1985 [20]4 years ago
8 0

Answer:

DNS

Explanation:

scoundrel [369]4 years ago
7 0

Answer:

The correct answer to the following question will be C. DNS.

Explanation:

DNS stands for Domain Name System, users able to find any information with the help of the domain name. Each and every device which are connected to the internet has there owned IP address, DNS is a system used to translate the domain names into the IP address so it will find the information or browsers can load the resources of the internet.

So by entering the domain name instead on an IP address can also browse the information for any user. And other options like HTTP (Hypertext transfer protocol), HTML (Hypertext markup language) and TCP/IP (Transmission control protocol / Internet protocol) can't help any user for accessing the work done by the DNS.

You might be interested in
Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using cin. Ex: If NUM_GUESSES is 3 and u
vlabodo [156]

Answer:

Follows are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main() //defining main method

{

const int NUM_GUESSES = 3;//defining an integer constant variable NUM_GUESSES

int userGuesses[NUM_GUESSES];//defining an array userGuesses

int i = 0;//defining integer variable i

for(i=0;i<NUM_GUESSES;i++)//defining for loop for input value

{

cin>>userGuesses[i];//input array from the user end  

}

for (i = 0; i < NUM_GUESSES; ++i)//defining for loop fore print value  

{

cout <<userGuesses[i] << " ";//print array value with a space

}

return 0;

}

Output:

9

5

2

9 5 2  

Explanation:

In the above-given program, an integer constant variable NUM_GUESSES is defined that holds an integer value, in the next step, an integer array "userGuesses" is defined, which holds NUM_GUESSES value.

In the next step, two for loop is defined, in the first loop, it is used for an input value, and in the second loop, it prints the array value.    

6 0
3 years ago
HELP BRAINLST!!<br><br> How is labor already being automated in supermarkets?
11Alexandr11 [23.1K]

Answer:

Self-checkouts as well.

Explanation:

6 0
3 years ago
How do i voice record on my (acual ipod itself) ipod nano 4th generation helppppppp
Olenka [21]

Answer: it is called voice memo search it on your settings

Explanation:

3 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Help, with gaming unlocked
Leto [7]

Answer:

C. empathic understanding

8 0
4 years ago
Other questions:
  • What does a counterweight do for a mine winding system
    13·1 answer
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • Which of the following is not one of the Fatal Four events that cause three out of five construction worker deaths? A. Caught in
    8·2 answers
  • (08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about wha
    11·2 answers
  • What is the color of red?
    9·2 answers
  • Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network
    8·1 answer
  • Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO T
    11·1 answer
  • The US government appropriates less than one million dollars in funding each year to STEM education programs. True False
    7·2 answers
  • Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    9·1 answer
  • Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can b
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!