1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
13

Which of the following is NOT part of the URL for an Internet web site?

Computers and Technology
1 answer:
Olenka [21]3 years ago
5 0

Answer:

There are five parts of an URL

Explanation:

A URL consists of five parts -- the scheme, subdomain, top-level domain, second-level domain, and subdirectory

You might be interested in
How will you identify a file type on your computer?
Andru [333]

You use the extension on the end of the file to tell you the type of a file

The extension is the .whatever in the name of the file

5 0
3 years ago
Consider the recursive method myprint in this code snippet: public void myprint(int n) { if (n < 10) { system.out.print(n); }
valkas [14]
What the method does, is it takes the rightmost decade and prints it, then divides by 10 and repeats. Effectively this means the number is printed backwards, so the output is 128.
7 0
3 years ago
Alternating Current or AC is better for use in ___________, while DC direct current is needed in _________ .
PIT_PIT [208]
<span>C electric power transmisson and electronics</span>
6 0
3 years ago
Read 2 more answers
What programming language has dominated scientific computing over the past 60 years?
lord [1]

c++,  because it is considered as the mother of all programming languages. you can easily access other programming languages if you have a command on c++

7 0
2 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
Other questions:
  • Which character must decide whether to support the assassins or avenge his friend's death?
    14·2 answers
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • In preparing his persuasive presentation, Reza should most likely focus on clearly presenting his
    6·2 answers
  • Write an assembly program that will prompt the user for 3 inputs (let’s abstractly call them a, b, and c) without a leading stri
    13·1 answer
  • Read the section, "Junior Year." Why would someone chose to complete an apprenticeship after high school? How many occupations c
    14·2 answers
  • An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
    13·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • Read the scenario below, and then answer the question.
    13·1 answer
  • Why computer manufacturers constantly releasing faster computers ?
    14·1 answer
  • Why are Quick Parts useful in an Outlook message?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!