1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
3 years ago
8

In order to help create a standard for displaying web pages correctly, Tim Berners-Lee developed which of the following technolo

gies?
A. Packet-switching
B. ICANN
C. Hypertext
D. TCP/IP
Computers and Technology
2 answers:
antoniya [11.8K]3 years ago
7 0

<u>Answer:</u>   C. Hypertext

<em>Tim Berners-Lee developed Hypertext.</em>

<u>Explanation:</u>

This is the language developed by <em>Tim-Berners-Lee for online communication or web-based interaction</em>. This language is called HTML where there will be a set of tags which the web-browser can understand and display the content to the <em>user in the user-friendly way. </em>

<em>HTML uses HTTP protocol and HTTPS protocol</em> for transferring packets or establishing connections. HTTP is little insecured to go for and HTTPS is a secured protocol where data transfer is safe throughout. <em>All the other given options in the questions are invalid.</em>

Ksivusya [100]3 years ago
5 0

Answer:

Hypertext

Explanation:

Hypertext Transfer Protocol (HTTP) was developed by Tim-Berners Lee, considered the founder of the World Wide Web, and is the standard for how webpage content is delivered across the internet.

You might be interested in
In today's classrooms, computers are generally being used to
Vinvika [58]
The answer is enhance traditional instruction. Computers are often used by teachers so that the teachers may have an easier time with their visual aids. Now that we have tools like powerpoint presentations and excel files, it will be easier for the teachers to prepare 
4 0
3 years ago
Which university first developed the use of email?
Arte-miy333 [17]

Answer:

Massachusetts Institute of Technology (MIT)

Explanation:

4 0
3 years ago
How do multi-cellular organisms develop?
FromTheMoon [43]
Letter B. is the answer
<span>B.  Cell differentiation - start from a single cell and as the cells divide they become specialized</span>

HOPE THIS HELPS















4 0
3 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Next, Adnan decides to recreate the structure on the
Lena [83]

Answer:

a square and a rectangle

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • A c++ member function that uses, but does not change, the value of a member variable is called
    13·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
    6·1 answer
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • You can't get close enough to the facility interior to launch an evil twin attack against its wireless clients; in fact, you hav
    11·1 answer
  • The cell address ZZ123 means
    5·2 answers
  • Does clicking ads and pop ups like the one shown in this image could expose your computer to malware?
    15·1 answer
  • Simplify 0.2×0.03055 to 3 decimal places​
    15·2 answers
  • Help help help help help!!!
    7·1 answer
  • a data analyst is working with a spreadsheet that has very long text strings. rather than counting the characters themselves to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!