1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
11

Why is it important to recognize web address endings? to know the type of information on a site to determine if the site’s infor

mation is engaging to understand how the information was researched to determine how current the site’s information is
Computers and Technology
2 answers:
padilas [110]3 years ago
7 0

Answer:

A i just did the test

Explanation:

seraphim [82]3 years ago
6 0

Answer: To know the type of information on a site.

Website address endings are known as domain extensions. In our current society, the domain extensions or website endings are indicators of what information or content the website will contain. By recognizing these domain extensions, you will have a clear understanding of what to expect from the website.

Some examples of these domain extensions are:

.edu

- The .edu extension indicates that the website is related to educational content.

.org

- The .org extensions indicates that the website is related to free organizations.

.com

- The ever famous .com extension is an indicator of a commercial type of website.

You might be interested in
The operating system (OS) of an information system contains the software that executes the critical functions of the information
Feliz [49]

Answer:

a. True

Explanation:

An information system (IS) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

On a related note, the software application that executes the critical functions of an information system (IS) are contained in its operating system (OS).

Basically, the computer's memory, processes, softwares and hardwares are typically being managed by the operating system (OS). Thus, an OS makes it possible for different programs to run simultaneously (more than one software program running concurrently) and access the computer's memory, central processing unit (CPU), and storage.

4 0
3 years ago
Who is a software developer
VARVARA [1.3K]

Software developers are the creative minds behind computer programs. Some develop the applications that allow people to do specific tasks on a computer or another device. Others develop the underlying systems that run the devices or that control networks.

5 0
4 years ago
Read 2 more answers
How to set up a simple peer-to-peer network using a star topology?
kkurt [141]

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

  • Each common network setups network unit, such as a firewall, switch, as well as computer.
  • The main network computer serves as either a server as well as the peripheral system serves as just a client.
7 0
3 years ago
Install hardware, install software, and convert data are the three steps found in the _____. Select one:
aev [14]

Answer:b)Conversion plan.

Explanation:Conversion plan is type of plan in which the the technique is followed by converting the data from the present system to another system's hardware and software surroundings.

The technique follows three basic steps in the conversion plan is software installation plan, hardware installation plan and conversion of data. Thus the correct option is option(b).

3 0
4 years ago
As a programmer,why do you think that skills and training are needed. give 5 reasons
grigory [225]

Answer:

bc

1 without them you wouldn't be able to program

2 need for job interviews

3 important to be good and make the money

4 can be adaptable

5 easy to move from a business to another

5 0
3 years ago
Other questions:
  • How does a content management system differ from a basic wysiwyg web authoring tool??
    11·1 answer
  • What is the difference between a queue and a stack?
    11·1 answer
  • John is a mechanical engineer. His first task at his job is to build any microphone of his choice. He chooses to build a dynamic
    12·1 answer
  • A block level element begins on a new line and some space is usually added before and after it - True or False?
    13·1 answer
  • If you need to provide a storage server with fault tolerance through the use of multiple paths between the server and the actual
    14·1 answer
  • What is the purpose of a mutator?
    8·1 answer
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • First computer to use Windows os?​
    5·1 answer
  • Critical Thinking Questions
    9·2 answers
  • If the transmitting device would like for the receiving device to push currently buffered data to the application on the receivi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!