1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
2 years ago
14

Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar

rowRight You transfer a text document. arrowRight You visit a website. arrowRight
Computers and Technology
1 answer:
emmainna [20.7K]2 years ago
3 0

Answer:

HTTP stands for "Hyper Text Transfer Protocol" and is used for transferring readable documents across the internet. This matches the action "You visit a website"

POP3  stands for "Post Office Protocol 3" and is used for reading e-mail.  This matches to the action "You check email in your inbox"

SMTP stands for "Simple Mail Transfer Protocol", and is used for sending email.  This matches the action "You send an email to a friend".

FTP stands for "File Transfer Protocol", and is used for transferring files to and from other machines.  This matches the action "You transfer a text document", although truthfully that description is so vague it actually matches all four of the given protocols.

You might be interested in
Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order.
Tomtit [17]
She is in spreadsheet.
3 0
3 years ago
Read 2 more answers
What kind of software consists of the programs that control or maintain the operations of a computer and its devices?
patriot [66]
Instructional coding hope this helps
6 0
2 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Which device do you think is the most important in the development of human civilization
insens350 [35]

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

7 0
3 years ago
A file that is 242 megabytes is being downloaded. if the download is 15.4% complete, how many megabytes have been downloaded? ro
Lunna [17]
37.26 megabytes have been downloaded
5 0
3 years ago
Other questions:
  • Consider the following general code for allowing access to a resource:
    13·1 answer
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • When planning your educational and career path, it makes sense to consider where you want to work and what type of work you want
    14·1 answer
  • Which of the following identifies the patterns used for each data series in a chart?
    13·1 answer
  • Gmod how to make someone admin on a lan server
    6·2 answers
  • I get such an error when I turn on the computer, how can I fix it?
    7·1 answer
  • What are the paparazzi?
    8·1 answer
  • What game is this?????????????????????
    15·1 answer
  • An end-user license agreement protects _____.
    11·1 answer
  • Current flow is the same through all the elements of a series circuit.<br><br> true or false?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!