1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
5

HTTP is made to facilitate which kind of communication?

Computers and Technology
1 answer:
vampirchik [111]3 years ago
7 0
The answer is fc because it has facilitate and communication
You might be interested in
If we were to replicate Dr. Stanley Milgram's obedience study today, do you think the results would be different?
Montano1993 [528]

Answer:

Explanation:

The results would be exactly the same. We have learned little about authority and when to oppose it.

I'll give you an example. Last night I was in a restaurant like Taco Bell or Subway. Across from me was a girl with an ordinary backpack which was all I could see. It was quite common to see that in the University District where I was. I paid no attention until two policemen came in (both over 200 pounds -- she was tall but could not have been more than 130) and began arrest procedures. She started shouting very foul language but otherwise did not resist. They put handcuffs on her wrists which were behind her back. Again she she  used profane language only screaming that they were hurting her. It took the one police officers a moment to find his key and loosen the cuffs, which he did, but she was still uncomfortable and cursing.  

She was silent as they took her out. Nobody questioned the incident at all. Do you think Dr. Millgram would recognize this as an example of his theory? I'm sure he would. Trust me, this was not staged. There was a 3rd officer who drove the girl and one of the 2 arresting officers away.

7 0
3 years ago
What is stored in str after the following code executes?
uranmaximum [27]

Answer:

"CoCoComputer Science"

Explanation:

First let's understand how the loop works, then we'll see what it does.

The variable i is initialized to value 0.  Then inside the loop, it's incremented by 2 in each loop passage, while i < 8, so the loop will be processed with the following values of i: 0, 2, 4 and 6.  It will run a total of 4 times.

Let's examine the actions done during the FIRST loop:

(str equals "Computer Science", so indexOf('m') = 2, i = 0)

- if the index of 'm' within the string is < i  (index = 2, i = 0, FALSE)

does nothing

increases value of i by 2 (now i = 2)

Let's examine the actions done during the SECOND loop:

(str equals "Computer Science", so indexOf('m') = 2, i = 2)

- if the index of 'm' within the string is < i  (index = 2, i = 2,  FALSE)

does nothing

increases value of i by 2 (now i = 4)

Let's examine the actions done during the THIRD loop:

(str equals "Computer Science", so indexOf('m') = 2, i = 4)

- if the index of 'm' within the string is < i  ( index = 2,  i = 4, TRUE)

then str becomes "CoComputer Science"

increases value of i by 2 (now i = 6)

Let's examine the actions done during the FOURTH loop:

(str equals "CoComputer Science", so indexOf('m') = 4, i = 6)

- if the index of 'm' within the string is < i  (index = 4,  i = 6, TRUE)

then str becomes "CoCoComputer Science"

increases value of i by 2 (now i=8)

Loop ends because i = 8 (i < 8 becomes false)

6 0
3 years ago
Pipeline parallelism focuses on which of thefollowing?Decreasing sub task execution timeIncreasing throughput of task executionO
natali 33 [55]

Answer: Overlapping of the execution task

Explanation: Pipeline parallelism is the way of splitting the task into format or sequence of certain levels. Every level has the output from the previous level as display as its input and thus takes a form of downstream.This also helps in increment of the throughput in the central processing unit(CPU). Thus ,this process suggest that there is the overlapping in the execution tasks which is the main factor of the pipeline parallelism.

7 0
3 years ago
Create an application that calculates and displays the amount of a homeowner's property tax. The tax is 1.35% of the property's
Valentin [98]

Answer:

a) Planning chart:

Create the form, and add two buttons, calculate and exit, and add two labels and two textboxes, as shown in the second image. Now code the buttons as shown in the image file, and debug. The required program is ready.

b) The design is as shown in the second image,

c) And the code for the windows form is also ready. Steps in brief. Open visual studio, Go to file menu and hit on New. Now choose Windows form from project type, and give the project name VB2017/chap02. Now code as explained in A, and as explained in images.

D) We just need to follow the plan to build the interface.

E) The code of exit button. Double click exit button to enter code-behind, and add this.Close(); And that's it, we have the project ready.

Explanation:

Please check the answer section.

And If you want Rounded off value, then you need to all below code in calc_click method. Double click on calc, and code behind will appear. Add the below code over there:

double tax = Convert.ToDouble((textBox1.Text)) * 5/100;

           double Roundedtax = Math.Round(tax, 2);

           textBox2.Text = Convert.ToString(Roundedtax);

           textBox2.Show();

           textBox3.Text = Convert.ToString(Convert.ToDouble(textBox1.Text) + Convert.ToDouble(textBox2.Text));

           textBox3.Show();

For dollar sign, add a label after each textbox, and change its text to $s.

5 0
3 years ago
Which of the following is an attack which is launched from multiple zombie machines in attempt to bring down a service?A. DoSB.
ss7ja [257]

Answer:

C. DDoS

Explanation:

DDoS stands for Distributed Denial of Service. It is an an attack which is launched from multiple zombie machines in attempt to bring down a service. The distributed in DDoS signifies the multiple machines used for the attack. The large number of incoming connections/requests overloads the service thereby rendering it unable to fulfil valid requests. In case the attack is originated from only one machine, it is known simply as the Denial of Service (DoS) attack.

6 0
3 years ago
Other questions:
  • Consider the folloeing website URL:http://www.briannasblog.com. What does the "http://" represent?
    11·1 answer
  • True/False
    11·1 answer
  • Given the code that reads a list of integers, complete the number_guess() function, which should choose a random number between
    6·1 answer
  • What is text box and label control​
    10·2 answers
  • Write a small program basic c++, that defines a negative integer (between ‐1 and ‐255), converts it to a positive value and then
    10·1 answer
  • _______ allows you to add formatting such as shapes and colors to text. a. worddraw b. wordart c. worddesign d. wordshapes
    10·2 answers
  • What is the main component of the EV3 Lego Robot called?​
    6·1 answer
  • Mad libs are activities that have a person provide various words, which are then used to complete a short story in unexpected(an
    14·1 answer
  • Which is a linear presentation?
    10·1 answer
  • What report shows which types of mobile devices visited a website?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!