1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
5

A user has just clicked the OK button on a Web form. Which technology is often used to process information sent from the form?

Computers and Technology
1 answer:
Taya2010 [7]3 years ago
7 0
Still cant tell which is which
You might be interested in
What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
Pavel [41]
They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures
4 0
2 years ago
Which open-sourced packet capture tool uses linux and mac os x operating systems?
Leto [7]

Tcpdump is an open-sourced packet capture tool which uses Linux and Mac OS X operating systems.

<h3>What is tcpdump?</h3>

Tcpdump can be defined as an open-sourced packet capture tool that is typically used to monitor and record TCP/IP traffic that are passing through a network and most Unix-like operating systems such as Linux.

This ultimately implies that, tcpdump is an open-sourced packet capture tool which makes use of Linux and Mac OS X operating systems.

Read more on tcpdump here: brainly.com/question/14485515

#SPJ12

5 0
3 years ago
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
S_A_V [24]

Answer: Option [C] : The longest time path through the network.

Explanation:

The critical path of a network is the longest time path through the network.

8 0
3 years ago
In one sentence, how would you sum up the internet?
Slav-nsk [51]

Answer:

an informational system

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Beside homework, what products can you use for personal use? Identify three uses and briefly describe.
    15·1 answer
  • what important technology has done the most to allow small businesses a change to compete with larger international companies?
    5·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • Wap to input any multi digits number and display the sum of odd digits and even digits​
    5·1 answer
  • The Cursor is blinking in a white area on the Screen. This area where text will appear in the ____.
    10·2 answers
  • __________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of
    11·1 answer
  • Việc áp dụng khai báo hải quan điện tử có áp dụng chữ ký số, đem lại những lợi ích gì
    10·1 answer
  • Can someone please give me Python test 3 it would help me tremendously
    5·1 answer
  • 10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
    8·1 answer
  • Give two logics how a computer is better then man ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!