1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
10

The server name portion of a url is also called the ____.

Computers and Technology
1 answer:
lawyer [7]3 years ago
6 0
It is also called domain name.
so ur answer is DOmAIN NAME
You might be interested in
Gabriel needs to create a formula that does not change when it is copied to cell b2. which formula should he create?
azamat
=sum(1+1)  it's a simple formula and won't change from any cells. Another you can do is to put a value in a specific cell, let's say, C3. Then have a formula that says, =sum(C3+2). But if you REALLY wanna impress someone - put a value in A1 - anything at all. Then put this formula in any other cell you want. If you change cells, you get a different answer. If you change the # in A1, you get different answers, all thanks to the RANDom function.  =SUM((RAND()*100)+A1)

4 0
4 years ago
Provide an example of a closed‐end credit account that Caroline has.
Usimov [2.4K]

<u>Explanation:</u>

Closed end credit is a loan for a stated amount that must be repaid in full by a certain date. Closed end credit has a set payment amount every month.The government and banks can limit the interest rates and fees that credit card companies can impose.


<u>Example:</u>

An example of closed end credit is a car loan.

5 0
4 years ago
Helppppppppppppppppppppppppppppppppp
Natalija [7]

Answer:

answer below

Explanation:

hope this helps

6 0
2 years ago
Read 2 more answers
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
HELP ME RIGHT NOW !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
11Alexandr11 [23.1K]
Technology has helped tremendously business professionals to be more efficient.

2. Business professionals work on the basis of information . Management information is available at the click of the mouse.

3. Communication, within and outside the organisation, has become very easy.

4. Controls on Accounts has become more efficient and less tedious.

5. Work drudgery has been given a go by. Technology has given more free time which can be used for thinking and planning.  
5 0
3 years ago
Other questions:
  • Eye injuries usually occur as a result of all of the following things, EXCEPT:
    13·2 answers
  • Continuous reboots of a Windows host upon encountering a persistent stop error might be caused by Startup and Recovery configura
    10·1 answer
  • How do i set up a RAID 1 array?​
    6·1 answer
  • Sometimes, fourth-generation languages (4GLs) are called procedural languages
    9·1 answer
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • You would like to narrow your search on this topic.
    15·2 answers
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • Q.No.3 b. (Marks 3)
    5·1 answer
  • Which statement describes a biotic factor interacting with the environment?
    5·1 answer
  • Who is primarily responsible for ensuring cybersecurity in society? Select 3 options.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!