1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
12

A web browser sends a request to the web server using what

Computers and Technology
1 answer:
goldenfox [79]3 years ago
3 0
Web browsers and servers communicate via TCP/IP.  HTTP protocol is the standard application protocol that supports the responses.
You might be interested in
In a presentation, bullets in a text box will do which of the following?
vesna_86 [32]
It will help you present data with concise statements.
8 0
4 years ago
When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the c
MariettaO [177]

Answer:

A short

Explanation:

A short in electrical terms is an abbreviation for a short circuit. This generally means that there is an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected together causing the cable to fail.

8 0
4 years ago
The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts wher
Slav-nsk [51]

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

4 0
3 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
4 years ago
Read 2 more answers
Other questions:
  • Modify the Eggs program to create a new one named EggsInteractive that prompts the user for and accepts a number of eggs for eac
    13·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
    10·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • How much memory did the first smartphone have?
    11·1 answer
  • After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
    15·1 answer
  • PLEASE HELP ILL GIVE BRAINIEST
    6·2 answers
  • Comment if u wanna text me on behance
    6·1 answer
  • Which of the following is a document view you can select using Button on the status bar?
    11·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!