1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
8

Why is https used in every link of a website?

Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
6 0

Answer:

As a request-response protocol, HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to communicate with servers.

You might be interested in
Microsoft edge is a web browser that was designed as an add-in to internet explorer. true or false
arsen [322]
"add-in" is pretty ambigious but I would go with true for this one.
7 0
3 years ago
Pls can anyone be so kind and answer this question.....i need the answer urgently
mixas84 [53]

Answer:

so u have to be smaet

Explanation:

8 0
3 years ago
How to see how many words you have on google docs?
liberstina [14]
In the menu bar, click Tools > Word Count or hit Ctrl/Cmd + Shift + C.
4 0
3 years ago
The ________ program displays graphics and loading screens during the boot process.
Minchanka [31]
Booting would be complete if the normal, runtime environment has been achieved. A boot loader is a program that loads operating system for the computer after the completion of power on tests. The boot manager is a program that displays graphics and loading screens during the boot process.
3 0
3 years ago
How does a hub-and-spoke network increase operational efficiency?
tatuchka [14]
<span>Significantly fewer routes are needed to serve the network. This is because the number of pairings in a P2P network increases at a greater rate than the increase in nodes. (For those familiar with Big-O notation, it’s O(n^2) ).</span>
7 0
3 years ago
Other questions:
  • There are n tasks to complete. Each task first needs to be preprocessed on a supercomputer and then finished on one of n process
    12·1 answer
  • Orifice tubes are A. coded in American models only. B. coded by number for easy identification. C. similarly but not exactly siz
    12·1 answer
  • A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
    9·1 answer
  • ou and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are
    7·1 answer
  • Electricity fact topic
    10·2 answers
  • Which of these is not a type of socket?/computer wise
    12·1 answer
  • Write a program that accepts two numbers R and H, from Command Argument List (feed to the main method). R is the radius of the w
    11·1 answer
  • Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and remo
    10·1 answer
  • Quiz #1: In Fnaf 4 After chris gets bit by Fredbear what animatronic does he start to possess and how does he die?
    10·2 answers
  • You have this code in your program.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!