1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
3 years ago
10

Which of the following statements is NOT true about url extension?

Computers and Technology
2 answers:
Tamiku [17]3 years ago
8 0
.col-used by post secondary educational institutions
Scorpion4ik [409]3 years ago
7 0

Answer:

col-used by post secondary educational institutions

Explanation:

You might be interested in
You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
dezoksy [38]

Answer:

MAC (Mandatory access control)

Explanation:

Mandatory access control is a type of access control.MAC is a strategy that are defined by system administration. MAC access is controlled by administration.  Administrative security access training, security awareness , written policies and procedures, incident response plan , agreements and background checks.                        

4 0
3 years ago
A person's oral communication skills can give either a positive or negative first impression.
ratelena [41]

Answer:

true

Explanation:

oral communication can be awkward or good.

5 0
3 years ago
Which of the following is NOT something you can specify in the bullets and numbering dialog box?
geniusboy [140]

type tool?? not postive


4 0
3 years ago
Assume the existence of a Bank Account class. Define a subclass, Savings Account that contains the following: a double instance
Finger [1]

The solution is in the attachment

5 0
3 years ago
BRIANLIEST!!!!!!!!!!!!!!!!
oksano4ka [1.4K]

Answer:

First Line indent

Explanation:

should be correct

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which OS, in your opinion, manages multiprocessing in the most efficient manner?
    14·1 answer
  • Which view In a presentation program displays you’re slides in full screen modes ?
    8·2 answers
  • A multiplicative inverse of 3 modulo 5 is any integer a such that 3 a ≡ 1 (mod 5) , hence for some a ∈ Z5 .
    12·1 answer
  • The array s of ints contain integers each of which is between 1 and 1000 (inclusive). write code that stores in the variable ord
    9·1 answer
  • Mention two strategies of collecting data​
    13·1 answer
  • Write a procedure ConvertToBinary that takes an input as a number from 0 to 16 (including 0 but not 16) and converts it to a bin
    11·1 answer
  • How does a modem work​
    13·1 answer
  • Write programs in python to display “Valid Voter”. (condition : age of person should be
    10·1 answer
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
  • Define a function Output Value() that takes two integer parameters and outputs the sum of all negative integers starting with th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!