1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
13

The browser on which you are viewing web pages is called the

Computers and Technology
1 answer:
iren2701 [21]3 years ago
5 0

Answer:

client

server

Explanation:

The browser is the client, and the system that sends you the web page is known as the server. And these together form the client-server architecture. A perfect example of a client-server model is, however, a video game that has an app for the client, and a server. And as an example, such set up is established using the socket programming or the SignalR in dot net. Various other technology does support socket programming. And you can find it in fact on all the platforms.

You might be interested in
Digital cameras always create great photographs. <br>True <br>False
Pavel [41]

True..they do take great photography..

8 0
3 years ago
Read 2 more answers
Find the greatest common factor of 48 and 36.​
gregori [183]

Answer:

Hello, The prime factorization of 48 is: 2 x 2 x 2 x 2 x 3. And The  prime factorization of 36 is: 2 x 2 x 3 x 3.

Explanation:

The prime factors and multiplicities 48 and 36 have in common are: 2 x 2 x 3.

2 x 2 x 3 is the "GCF" of 48 and 36.

"GCF"(48,36) = 12.

7 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Which of the following is computer memory that works while the computer is turned on?
Crazy boy [7]

Answer:

Ron is the answer

Explanation:

In that sense it is similar to secondary memory, which is used for long term storage. When a computer is turned on, the CPU can begin reading information stored in ROM without the need for drivers or other complex software to help it communicate.

5 0
3 years ago
Part 1: Plan and Write the Pseudocode
salantis [7]

lol thats alot of work ill try and get it done before my class starts; (ill edit it)

8 0
3 years ago
Read 2 more answers
Other questions:
  • The fossilizing process that replaces organic matter with silica or calcite is:
    13·2 answers
  • Create a class called Clock to represent a Clock. It should have three private instance variables: An int for the hours, an int
    15·1 answer
  • Which payment type is best if you are trying to stick to a budget?
    6·1 answer
  • Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles. Use the follow
    9·1 answer
  • Academic databases are the best place to look for
    12·1 answer
  • Data management technology consists of the: Group of answer choices physical hardware and media used by an organization for stor
    13·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • Where does blood travel when it leaves the right ventricle of the heart
    11·2 answers
  • Task queues, which allow for asynchronous performance, are an important part of modern processing architectures. Information abo
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!