1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
14

What is a unique text-based Internet address corresponding to a computer's unique numeric IP address called

Computers and Technology
1 answer:
bekas [8.4K]3 years ago
8 0

Answer:

Domain Name

Im in the class right now we just took a test on this and i got a 96

If you need more help lmk

You might be interested in
The REPE prefix does which of the following ?a. Repeats an instruction while the zero flag is clearb. Repeats an instruction whi
lora16 [44]

Answer:

repeats an instruction while the Zero flag is set

Explanation:

hope this helps you :)

6 0
3 years ago
Read 2 more answers
Declare a structure whose tag name is Server and that contains the following fields: manufacturer, a string, model and serialnum
NemiM [27]

Answer:

The answer to this question as follows :

Structure definition:

struct Server  //define structure server.

{

string manufacturer;

 //define string variable.

string model, serialnum;  //define string variable.

int year;

 //define integer variable.

double clockSpeed;

 //define double variable.

int cores;   //define integer variable.

int ram;

    //define integer variable.

int storage;

  //define integer variable.

};

Explanation:

Structure is a collection of heterogeneous(different type) elements. It is a user-define datatype which is available on the C/C++ programming language. To define any structure we use the struct keyword. The syntax of defining structure can be given as:

Syntax:

struct structure name

{

//define variables

//statements and code.

};

OR

struct structure name

{

//define variables

//statements and code.

}create structure variable;  

In the above structure code, we define a structure that is "Server". In this structure, we define different types of variables that is " manufacturer, model, serialnum, year, clockSpeed, cores, ram, and storage". In this structure variable manufacturer, model and serialnum datatype are a string and clockSpeed datatype is double and variable year, cores, ram, and storage data type is an integer.

3 0
3 years ago
The opening of the throttle plate can be delayed as long as
blsea [12.9K]
<h2>I'm trying to adjust the sawtooth throttle on my H. I can open the throttle to 8 notches from the top and it is at the 1815 rated rpm. When I go above that it will overspeed, up to 2500rpm! At the last notch on the quadrant. I have tried the adjustments in the governor, the only thing I have been able to do is set the high rpm screw so it stops at the 8th notch from the top. I should be able to have full use of the quadrant and not go over the 1815 rpm, right? Does anyone have a pic of the throttle linkage under the hood and how to adjust it? I've also tried adjusting the rod in the governor between it and the carb, it is tightened all the way up now. Any ideas what I am missing?</h2>
6 0
3 years ago
Is “Annabelle” a true story? I mean it is fiction right?
Julli [10]
Annabelle is indeed a true story making it fiction
5 0
3 years ago
Read 2 more answers
Mario wants to make his document accessible to technology users. He first needs to access the Accessibility Checker. He can do t
Vlada [557]

Answer: see guidelines in explanation

Explanation:

For Mario to make his document accessible to technology assistants, he needs to do the following;

-Access the accessibility checker by clicking the FileHomeReview tab

-Click the InfoNewOpen option

-Click the Check for IssuesManageDocumentProtect, the document icon

-Then, click Check accessibility option, the accessibility pane will open.

-He needs to read the information about errors, warning, tips and steps to take to make his document accessible to other users.

8 0
3 years ago
Other questions:
  • Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
    10·1 answer
  • Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises". Each
    15·1 answer
  • Scale-based classification for networks allows us to differentiate PANs, LANs, MANs, and WANs. Moreover, the structure of a netw
    6·1 answer
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    9·1 answer
  • Which type of graph or chart will you use to show changes in data points?
    5·1 answer
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills.
    6·1 answer
  • Whats the wire that connects to the wifi box
    15·2 answers
  • Make a list of five primary raw materials, for each one, indicate and industrial material that is created from it
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!