1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
15

Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?

Computers and Technology
1 answer:
horrorfan [7]3 years ago
3 0

Answer:

d

Explanation:

You might be interested in
Use the {blank} to view your presentation the way an audience will see it.
steposvetlana [31]
I would believe it would be A. Slide Show Button
4 0
3 years ago
Read 2 more answers
Your manager asks you to calculate the sale price if the product is marked down 20 percent. You enter the original price in cell
Deffense [45]

Answer:

Option =42*.80

Explanation:

We can define a formula in Microsoft Excel using which is always started with "=" and then followed with the mathematical rule defined on the target columns or rows.

In this question,  we are expected to calculate the marked down price for 20 percent. This means the new sale price will be 80% of the original sale price. Since the original place is in cell A2, we can define a formula using =A2* .80 to get the expected result.

3 0
3 years ago
Blood Alcohol Level (BAL) is the ratio between the alcohol consumed and the blood in the body. A. True B. False
horsena [70]
I think its true I'm not sure
3 0
3 years ago
Read 2 more answers
Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
rjkz [21]

Specialized data analysts are needed for data mining in order to ask ad hoc inquiries and swiftly get responses from the system. choose one. This claim is false.

<h3>What does data mining mean exactly?</h3>
  • Large data sets are sorted through in data mining in order to find patterns and relationships that may be used in data analysis to assist solve business challenges.
  • Enterprises can forecast future trends and make more educated business decisions thanks to data mining techniques and technologies.
  • Increasingly huge databases are explored via data mining, which also helps market segmentation.
  • It is feasible to predict a customer's behavior to guide personalized loyalty marketing by analyzing the links between criteria like their age, gender, and preferences.

To learn more about Data mining, refer to:

brainly.com/question/2596411

#SPJ4

5 0
2 years ago
An effective technology for e-training and e-learning is __________, which uses computer graphic displays that the user can adju
ruslelena [56]

Answer:d)Visual interactive simulation (VIS)

Explanation:Visual interactive simulation (VIS) is the technology that works in a system for its development and simulation application for making the system display dynamic.

The dynamic display is preferred because it creates the interest in clients and is also used for the e-learning purpose. It also helps in decision making in accordance with competitive process.

LOT, Flash and WebEx does not provide the  service for the e-teaching services with the dynamic display feature.Thus , the correct answer is option(d).

4 0
3 years ago
Other questions:
  • To connect multiple usb devices to a single usb port, a ____ can be used.
    12·1 answer
  • To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a?
    8·2 answers
  • Look at the following form. Which input method is the form using to receive the user's favorite activity? What is your favorite
    12·2 answers
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • Rick works for the government and is investigating a small business that the government suspects has been cheating on its taxes.
    15·1 answer
  • The building blocks of coded language are called
    11·2 answers
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • Please complete the following questions. It is important that you use complete sentences and present the questions and answers w
    6·1 answer
  • Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!