1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
8

Which do web servers host? Websites Networks Firewalls Zones

Computers and Technology
1 answer:
bixtya [17]3 years ago
6 0

Answer:

Websites

Explanation:

A web server host websites, individuals or corporate websites, this helps us to show our websites in the World Wide Web, there are several companies offers this service, even we can get a free host, but a corporate website or a social media needs a lot of host recourses, these hosts are expensive than other, we could pay a web host monthly or per year.

You might be interested in
You are creating a query for a website. The query
stepan [7]
Answer is A, Action query
6 0
2 years ago
How many much memory is in one megabyte ?
Igoryamba

Answer: 8 bits is a byte. 1000 bytes are a kilobyte. 1000 kilobytes are a megabyte.

5 0
3 years ago
Such a class might store information about the account balance, the name of the account holder, and an account number. What inst
nadya68 [22]

Answer:

an instance variable is a variable that is within a class but it is outside of constructors, methods or blocks.

the instance variables for the class bankAccount can be accountNumber, account holder name and balance.

below are the types and names declared to hold the information.

private string accountHolderName;

private int accountNumber;

private double balance;

note:

accountHolderName is a string data type because names are in alphabets.

accountNumber is an integer since they are in numbers.

balance is a double data type because it is a floating point number.

4 0
3 years ago
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
irga5000 [103]

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

4 0
3 years ago
An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere out
g100num [7]

Answer:

D. at the intersection of at least two constraints.

Explanation:

Linear programming is an optimization technique which is fine for the purpose of getting the best solution such as maximizing profit or certain o 4th era quantities. It is fine by modelling real life problems into mathematical models that have linear relationships or constraints such as in the form of objective functions. In linear programming, an objective function defines the formula for quantity optimization and the goal from this is to determine variable values that maximize or minimize the objective function depending on the problem robbery solved.

8 0
3 years ago
Other questions:
  • Which of the following is an example of a logic bug?
    8·1 answer
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • A label is any word that appears in a cell of a spreadsheet.<br> True<br> False
    5·2 answers
  • What is a binary message
    12·2 answers
  • 2
    11·1 answer
  • When you touch a hot stove, along which pathway will the impulses travel and what is the final destination in the cns?
    12·1 answer
  • Which attack intercepts communications between a web browser and the underlying computer?
    10·1 answer
  • Which of these five are Netflix Originals?1/5
    5·1 answer
  • Please help this is a coding assignment I need help! (use python)
    12·1 answer
  • After reading his e-mail messages, Orlando became very frustrated. Many of the messages he received did not conform to netiquett
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!