1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
14

The same student is curious about how a Web site appears on his computer screen. On a separate piece of paper, draw and explain

the communication between a client and a server when the client requests a Web page; use the OSI model as a reference. For example, what Application layer protocol is required?How will the process differ if the student is sending or retrieving information to or from a secure Web site?

Computers and Technology
1 answer:
Ksivusya [100]3 years ago
8 0

Answer:

HTTP is the application layer protocol required.

Explanation:

For a web page to be displayed on a browser, the seven layers of the OSI model work together. On the application layer, HTTP protocol is used to communicate between the server and the client. The HTTP client is the browser (Chrome, Internet Explorer, Firefox etc.) which sends a request to the HTTP server for accessing a web page.  

When a URL is accessed, the HTTP client sends a request to the HTTP server. The server locates the file which is being requested and sends a response message containing the web page which is to be displayed. The exchange of data between the HTTP client and server takes place over a TCP connection.

TCP is a transport layer protocol which provides a reliable connection over which the exchange of data takes place. Data at the transport layer is sent in the form of segments. If the data being sent from the server is too long, it is divided into multiple segments and sent one after the other. The client is then responsible for joining the segments and displaying the information as a web page. The transport layer is also responsible for error correction and detection during the communication process.

If the student is sending or retrieving information from a secure website, the messages being exchanged between the client and server will be encrypted. This means that if a third-party tries to tap the communication process, they would not be able to decipher the messages. This increases the security and helps keep the information present on the web page confidential.

You might be interested in
Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
lukranit [14]
Plug and play installation
4 0
3 years ago
Using a conversation voice is part of:
MaRussiya [10]
Need more information
4 0
3 years ago
Create the code that will find
frez [133]

Answer:

function findLongestWord(str) {

 var longestWord = str.split(' ').sort(function(a, b) { return b.length - a.length; });

 return longestWord[0].length;

}

findLongestWord(InputHere);

Explanation:

Replace InputHere with the input

7 0
3 years ago
Think about a career you would like to have 10 years from now.
WITCHER [35]

Answer: Scientist

Explanation: Scientists use technology to record data, as well as using technology to study different things, for example scientists use computers to track DNA.

6 0
3 years ago
Which of the following is NOT a common grammar adjustment which is identified by grammar-check software?
Sedbober [7]

Answer:

Shortened versions of phrases Ex:(l ol, s mh, i dk, ect.)

Explanation:

Hope that this helps, if you have any more question please feel free to contact me, hope you have an amazing rest of your day. ;D

7 0
3 years ago
Other questions:
  • True or false the primary advantage of the worksheet is the ability to solve numerical problems quickly and accurately
    11·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • Select five system utility functions.
    11·1 answer
  • ¿Ha existido en la historia de nuestra humanidad alguien que hubiera hecho posible el sueño del ser humano en obtener energía li
    11·1 answer
  • ​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted
    8·1 answer
  • Write a program that:
    13·1 answer
  • Assert statements are a tool programmers employ to help them debug their code more efficiently.
    6·1 answer
  • Write the use of these computers.
    14·1 answer
  • [C++] 4.17 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in
    8·1 answer
  • The ______ engine compares your entry against its database and returns a list of hits or sites that contain the keywords. (hint:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!