1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
7

What private service may occur on a web server?

Computers and Technology
1 answer:
katrin [286]3 years ago
3 0

I believe the answer is D

You might be interested in
write a function that returns a list, where each member of list contains previous day’s value multiplied by 2.​
sergeinik [125]

Answer:

Explanation:

The following code is written in Java, the function takes in a list with the previous day's values. The function then uses that list, loops through it and multiplies each individual value by 2 and returns the modified list. The first red  square represents the test case for the function, while the second red square in the image represents the output.

 public static ArrayList<Integer> doubleIt(ArrayList<Integer> mylist) {

       for (int x = 0; x<mylist.size(); x++) {

           mylist.set(x, mylist.get(x)*2);

       }

       return mylist;

   }

5 0
3 years ago
Where can the container code be found in Google Tag Manager? (select all answers that apply) a. In a pop-up window after you cre
saveliy_v [14]

Answer:

Option A and C.

Explanation:

The container code can be located in Google Tag Manager inside a pop-up window when they set up an account as well as container and Under "Admin" through choosing that container and clicking Installing Google Tag Manager.

The main advantage for Google Tag Manager, ever though, would be that it create it in much easier manner for marketing companies to execute identifiers without depends on developers to use it. Developers tend to also be preoccupied with some other high-priority initiatives so tagging mostly finishes up on the other side burner

7 0
3 years ago
Beth is using computers to train her employees on a new data-mining technique along with classroom discussion. This will reduce
zzz [600]

Answer:

Technology-enhanced

Explanation:

In the past, education was limited to classrooms and laboratories in schools, with teachers providing physical well defined resources to students. Data was also sourced physically through questionnaires and other physical methods.

In recent times and with the advancement of computers and information system, notes are taken and shared, data is mined from databases online through these technology-enhanced method of education and learning.

3 0
3 years ago
P36. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why
KatRina [158]

Answer:

The Packets can be arrived out of an order from the Internet Protocol layer.  

So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.

Explanation:

  • All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).  
  • The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.  
  • The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
7 0
3 years ago
The NSA could be hiding small snooping programs in, let's just say, a picture of a cute kitten or a fun Android game." So how ca
grin007 [14]
One way could be to check the code of the program.
But of course this might not be possible... Not everyone knows a programming language. And even if you did, you might not know the programming language they used.

Another way is to download a program that monitors your incoming connections and outgoing connections from your computer/android/iphone.

When someone or something connects to your device, the program should alert you. Or when the computer makes a connection to a website/device.
8 0
3 years ago
Other questions:
  • What is micro blogging?
    13·1 answer
  • Alternatively, you can use a _______ to play a video on your web page.
    13·1 answer
  • What is the name of the component that allows us to use electrical pulses in a computer?
    8·1 answer
  • Objects of the calculator class require no additional information when created. define an object named calc, of type calculator.
    14·2 answers
  • Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
    13·1 answer
  • Which of the following provides services to hosts on its network?
    9·1 answer
  • Difference between ancient and modern mode of information <br> transmission
    12·1 answer
  • What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
    11·1 answer
  • What is the only way to remove a password encryption on an Excel file?
    6·2 answers
  • Which statement best describes a social impact of computing on the world?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!