1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
8

A computer connected to the Internet that asks for data is a(n) ________. Select one: A. server B. client C. aggregator D. surro

gate
Computers and Technology
1 answer:
madreJ [45]3 years ago
7 0

Answer:

client

Explanation:

The client makes a request for a service, and a server performs that service.

You might be interested in
Scrieți un program care citește un număr natural n și determină suma cifrelor divizibile cu 3 ale lui n.
Vika [28.1K]
Sorry I don't understand your question
5 0
3 years ago
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
galina1969 [7]
The answer is True bc it saves you time and is efficient
6 0
3 years ago
What is the default junk email protection in Outlook 2016?
Shtirlitz [24]
The answer to ur question is D
4 0
3 years ago
Read 2 more answers
Which of the following actions is most likely to raise legal or ethical concerns?
zavuch27 [327]

Answer:

arson, kidnapping, gun fighting

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • Analyze the following code. Is count &lt; 100 always true, always false, or sometimes true or sometimes false at Point A, Point
    11·1 answer
  • The objectivity of a site relates to its a. Appearance c. Graphics b. Biases d. Quotes from other Internet authors
    8·2 answers
  • Please list ten things that you have learned an Excel Spreadsheet can do.
    7·1 answer
  • What are the primary benefits of relying on systems development standards?
    7·1 answer
  • You can use pen and highlighter tools to emphasize information on a slide during a PowerPoint presentation. These tools are avai
    11·1 answer
  • .In Python, comments begin with the comment marker and continue ______.
    14·1 answer
  • A technique for identifying and tracking assets using technologies such as RFID and smart cards is known as electronic tagging.
    6·1 answer
  • Bakit mahalaga na marunong tayong gumamit ng makina?
    15·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    10·1 answer
  • ) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!