1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
12

A server of service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the lo

cation bar. If this service is malfunctions, your browser will display a page not found error.What server provides this service?a. Printb. Filec. DNSd. Webe. Authentication
Computers and Technology
1 answer:
san4es73 [151]3 years ago
3 0

Answer:

D. Web Server

Explanation:

When you type cengage.com in your browser, the browser takes this request and sends it to a server via a HTTP(Hypertext Transfer Protocol) server.The web server is responsible for responding to this request with the appropriate response. Every response received from the Webe server has a response code.  Here are some of the responses that you can get:

  1. 200 (ok): this means that the request was processed successfully and the appropriate webpage or resource is returned.
  2. 400(bad request) this means that the web server could not understand the request that was sent, because of a bad/syntax error.
  3. 401(unauthorized request) : this means that the person/client sending this request does not have the appropriate permission to get access the resource. Authentication is needed.
  4. 404(not found): this means that the resource or webpage being requested for cannot be found.

These are few among several other response codes that exist.

In the case of this question, the Page not found error(also known as 404 error) is received because the website page(cengage.com) being requested for by the browser was not found on the web server.

You might be interested in
The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​
yulyashka [42]
Option A is the main component
3 0
2 years ago
You would like to set up on online meeting to communicate with colleagues on a group project. Which of these tools should you su
Elenna [48]
WebEx :))))))))))))))))))))))
8 0
3 years ago
Read 2 more answers
Cách soạn thảo văn bản trên word
pickupchik [31]

Answer:

Did you mean How to edit text on word? There are 2 word, Microsoft Word Office and WordPad. The step I give you below is for both.

Explanation:

Steps to edit text on word

Step-1: Select the text you want to edit.

Step-2: Click on Home Tab.

Step-3: Select the style(s) you want to edit from the Font group

8 0
3 years ago
A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best
nikitadnepr [17]

Answer:

Option D i.e., Individuals; Interactions is the correct option.

Explanation:

Because Agile Manifesto is the development software tool that is used to reads the line for the individuals and it also interacts with the process of the user. It also used to collaborate with their customers to negotiates the contacts of the customers.

Other option is not correct because they are not related to the following statement.

5 0
3 years ago
What letter names the drive where windows most commonly stores data and programs?
Jobisdone [24]

Windows holds most of its data in the C: drive

5 0
4 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • Is there such a thing as an ethical reason for unauthorized access into a computer system?
    15·1 answer
  • How many bytes make up a megabyte? One hundred One thousand One million One billion
    12·1 answer
  • When should students practice netiquette in an online course?
    9·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • Using the program below, explain what the output will be at LINE A. 1 #include 2#include 3#include 4 5 int value - 128; 6 7 int
    11·1 answer
  • The shell of a document that may be used over and over in desktop publishing is called a
    9·1 answer
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • How to play Drinkopoly game?
    12·1 answer
  • The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!