1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web serve

r using the TCP/IP Internet protocol.
Select one:
a. HTTP GET
b. API
c. HTML
d. XML
Computers and Technology
1 answer:
irina1246 [14]3 years ago
4 0

Answer:

HTTP GET

Explanation:

The Hypertext Transfer Protocol (HTTP) is designed to enable communications between clients and servers and it uses the GET method to request data from the specified resource using the TCP/IP Internet protocol.

You might be interested in
Who can help me please? ​
malfutka [58]

Answer:

what do you need help with

4 0
3 years ago
Which storage con be used<br>as permanent storage<br>a) Rom<br>6) RAM, © main memery​
Veseljchak [2.6K]

Answer:

ROM

Explanation:

Data in ROM does not erase itself when the computer is shut down. The data is permentely written and stored.

4 0
3 years ago
I need help with this question. asap please
marissa [1.9K]

Answer:

what are you talking about

Explanation:

can you help me with my question

8 0
2 years ago
Which of the following may present a problem for Linux users?
motikmotik
Tendancy to crash hope that helped
6 0
3 years ago
Read 2 more answers
What is the least effective way to create balance and flow in your life
sweet [91]
Act on your emotions not your first thought of something wrong
6 0
3 years ago
Read 2 more answers
Other questions:
  • What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
    5·1 answer
  • The project manager of a software development team needs to hire someone to review every part of the software to make sure it wo
    7·1 answer
  • An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
    10·1 answer
  • What is shouting pertaining to the internet
    15·1 answer
  • According to Holpp and Kelly's approaches to developing vision, the benchmarking approach is more internally focused, whereas th
    6·1 answer
  • Which of the following protocols support the encryption and decryption of e-mail messages?
    13·1 answer
  • How to solve a program that accepts a number as input and prints just the decimal portion
    15·2 answers
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • 20 points for ez question lol
    9·2 answers
  • In English there are five vowel letters in the alphabet: A, E, I, O, U. For the purposes of this exercise we won't count Y as a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!