1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
6

Which of these is the term used to describe the location of an Internet page? A) social network B) Web address C) blog D) net

Computers and Technology
2 answers:
damaskus [11]3 years ago
5 0

Answer:

Explanation:

the answer here is web address

sineoko [7]3 years ago
3 0

C) web address

Hope this helps

You might be interested in
Electronic business includes which of the following
Alja [10]

Answer:

D. all of these

Explanation:

5 0
3 years ago
Read 2 more answers
The union of two bags is a new bag containing the combined contents of the original two bags. Design and specify a method union
irga5000 [103]

Omg does your fingers hurt?????! Are u okay?? Cause u typed a lot you could have just pictured it. Poor thing

3 0
3 years ago
The encapsulation unit on the presentation layer of the osi model is
Zielflug [23.3K]
<span>The encapsulation unit on the presentation layer of the OSI model is the Data link layer (2).</span>
7 0
3 years ago
Check the devices that are external peripheral devices:
irina [24]

Answer:

Mouse, and keyboard

Explanation:

Common Sense

6 0
3 years ago
An organization is trying to decide which type of access control is most appropriate for the network. The current access control
alisha [4.7K]

Answer: D.) Discretionary access control

Explanation: Access control modes provides networks with a security system used for moderating, risk prevention and privacy maintainance of data and computing systems. Several access control modes exists depending on the degree of control required. In the discretionary access control approach, users are afforded the freedom and flexibility of making choices regarding permissions granted to programs. Hence, in this mode, permission are user-defined and as such sets privileges based on how the user deems fit.

8 0
3 years ago
Other questions:
  • You approach a railroad crossing with a cross buck sign that has no light or gates . What should you do ?
    5·1 answer
  • A virus that propagates using the internet or another computer network is called __________.
    10·1 answer
  • Assessing opportunity cost involves...
    6·1 answer
  • What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties so that the
    10·1 answer
  • Pick an appliance or an electronic device that you use at home that is powered from the wall outlet. Specify which electronics d
    10·1 answer
  • A pointer is the memory address of a variable. FALSE TRUE
    9·1 answer
  • The advancements in which of the following technologies has most changed the American job market in recent years?
    15·1 answer
  • Complete the sentence.
    8·2 answers
  • Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc
    12·1 answer
  • What is the difference between encoding and decoding?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!