1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
11

How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl

ate this?
Computers and Technology
1 answer:
nordsb [41]3 years ago
6 0
Awesome question! I love networking. When you enter a URL into your browser, your computer sends the request to your ISP or internet service provider. Your ISP has a HUGE database that coordinates the IP address to the domain name. This database is called a DNS, or Domain Name Service. So when you submit www.google.com to your ISP, they return look in the DNS and find the IP address. The ISP then returns the IP address to you. Your browser then takes the IP and connects you to the server. The server finally send the index.html file to and your browser and renders it as a web page. 

This all happens in the blink of an eye. The internet is truly amazing :D
You might be interested in
2. The Warren Commission investigated the assassination of President _______________________ in 1964.
Korolek [52]

Answer:

President Kennedy

Explanation:

John F. Kennedy was the 35th President of US. He was assassinated in 1963 in Dallas

7 0
3 years ago
Briefly explain how developers use a distributed version management system. You may assume that a master repository has been set
Akimi4 [234]

Answer:

Using version control tools like Git and Github.

Explanation:

Version control is a vital tool in programming in recent times. it helps to prevent loss of source codebase and creating unwanted folders for storing multiple codebases to prevent excess storage usage and time consumption.

Git and Github is a platform that handles version control and collaboration between co-workers. When a repository is created, its initial branch is called the master branch and when a staged code is committed, the commit is recorded. These records can be retrieved using the commit hash value and resetting the current unstaged file or code. A new branch can created to hold a different version of an application and merged later with the master branch.

4 0
3 years ago
Waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
True [87]

Answer:

AGGHHHHHHHHHHHHHHHHHHHGHGHHHHHH

Explanation:

8 0
3 years ago
Read 2 more answers
Why would a programmer use a “public” variable for something like speed? Provide at least two other examples of variables a deve
agasfer [191]

It is useful for things that you don't need to redefine, and you may need to use to compute different things (such that you have different modules/functions to compute each one of these things).

<h3><u>What is a public variable?</u></h3>

A public variable is a variable that any function, sub procedure, or module can access without restriction.

Thus, if you want to define a variable only once and be able to call it from different functions or modules when you need it, you would want to make it a public variable.

An example with speed is:

You can make a simple code that for an initial speed computes the position vs time graph.

But you may want to expand that program, let's say that you make a module that also allows you to find the momentum or something like that (where you also need to use the speed).

Then defining the speed as public, is useful, as you can only call it with the module or function that you use to find the momentum.

Another example, maybe more complete.

Assume that you work with radiation physics. You define a mean energy of radiation (this would be the energy of the x-rays for example).

Now if you define that variable as public, you could use it for a lot of modules to compute a lot of different things, like fluency, kermas, etc.

Things that are really complex to compute and you may have the codes for each one in different modules/functions.

So it is really useful when you already had several codes that work with the same variable.

If you want to learn more about variables, you can read:

brainly.com/question/15683939

7 0
3 years ago
In light of common budget constraints, explain how security professionals can participate in the training necessary to maintain
Anika [276]

Answer:

Security of the computer systems is becoming more crucial as the days go by due to events that threatens the safety and security of these computers, the internet and the resources shared on them.Security professionals are those people who have the necessary skill set to handle the security situation of the computers and network and can both maintains these systems and resolve  any security issue.

In light of the skill sets that they posses, they work for firms or they work on their own to maintain security. In general every skill needs to be revised and these skill is not an exception also there are newer threats and security issues which are arising every day hence there is need to maintain competence in their field which requires undergoing training and practice to handle the latest security threats that is constantly evolving each day.Due to the issue of budget constrains the security professionals can take the following actions in order to be able to participate in training:

  • Involve themselves in taking online courses over the internet
  • They can acquire self education materials , researches and case studies on both recent and past security events
  • They also engage in peer guidance and mentoring which would work in a vise versa way for information and knowledge exchange
  • participating in "hackathons" and  competitions as a way for them to identify the features and skill set to improve  

Explanation:

The question requires explanation so instead of answering the question by stating the points we first give a brief description of the state of  digital security in the world.Next we now talk about the security professionals ( who they are and what they do). Finally we then discuss about the need for training for these professionals and how these security professionals can access these training in a situation where there is a budget constrain issue  

8 0
4 years ago
Other questions:
  • In microsoft what displays when the mouse pointer rests on selected text or data that can be formatted.
    8·1 answer
  • A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
    14·1 answer
  • One way bloggers decide how to present information is by understanding
    7·2 answers
  • What technology habit you practice every day that you need to stop to be more successful?
    13·1 answer
  • A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask.
    7·1 answer
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • Clocks (also called timers) are essential to the operation of any multiprogrammed system. They maintain the time of day, and pre
    9·1 answer
  • If anyone wants to ft heres the link
    6·1 answer
  • Who doesn't like reeses
    11·2 answers
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!