1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
13

The program that translate the URL into an IP address is called the _____ ?

Computers and Technology
2 answers:
Vadim26 [7]3 years ago
8 0

Answer: domain name system

Explanation: very nice exam

Airida [17]3 years ago
7 0

Answer:

The Correct answer is  option A: Domain Name System

Explanation:

Let look at each option;

Domain Name System:

We we type an address for example brainly website  it goes to DNS server and find the IP address of the computer where brainly website  is located. Then the request goes to the IP address. This is the mechanism of DNS.

Resource Locator:

Resource Locator is the URL For example brainly website

Web Browser:  

Web browser is a software which is used for internet browsing for example Firefox

Web Server:  

Web Server is a computer which give services to clients.

You might be interested in
Word provides an undo button that can be used to cancel the most recent command or action. true or false.
erastova [34]
The answer would be true.
7 0
3 years ago
Read 2 more answers
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Determine the exact output of the code:
stiv31 [10]

Answer:

3

Explanation:

The function floor() is used to give the integer which is smaller than or equal to the provided decimal value.

for example:

let a=5.8

floor(a);

the function provides the value 5 (smaller than or equal to 5.8).

In the given code:

variable num assigns the number 3.14.

then, floor(3.14) gives the value 3 (smaller than or equal to 3.14).

then, the echo print the value on the screen.

Therefore, the correct answer is 3.

4 0
3 years ago
This code is supposed to accept a word as input, and then print that word to the screen.
atroni [7]

The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

<h3>What is Coding?</h3>

This refers to the use of programming that is used to give instructions to a computer system

Hence, we can see that The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

Read more about coding here:

brainly.com/question/16397886

#SPJ1

3 0
1 year ago
Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o
Luda [366]

Pseudocode algorithms are used as prototypes of an actual program.

The required pseudocode algorithm is as follows:

  • <em>Start</em>
  • <em>input name, score, test_worth</em>
  • <em>percent_score = score/test_worth * 100</em>
  • <em>print name, percent_score</em>
  • <em>Stop</em>

<em />

<em />

The first line begins the pseudocode algorithm

<em>Start</em>

The second line gets input for the student's name, score and the worth of the test

<em>input name, score, test_worth</em>

The third line calculates the percentage score

<em>percent_score = score/test_worth * 100</em>

The next line prints the student's name and the percentage score

<em>print name, percent_score</em>

The last line ends the pseudocode

<em>Stop</em>

<em />

<em />

<em />

Read more about pseudocode algorithms at:

brainly.com/question/21172316

4 0
2 years ago
Other questions:
  • The purpose of the ____________ element is to provide a method for a browser to display different images depending on specific c
    14·1 answer
  • Im trying to learn c# for unity does anyone know any good sources
    10·1 answer
  • The operating system of a computer is an example of ________ software. science-forum
    7·1 answer
  • Why is e-mail better for informative and positive messages than for negative ones?
    6·1 answer
  • In which step of writing a program does a programmer first use a<br> compiler?<br> documentin
    6·1 answer
  • PLEASE HELP ASAP!!
    11·1 answer
  • Which of these is an expansion slot type?
    5·1 answer
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • What command in cisco IOS allows the user to see the routing table
    5·1 answer
  • Authenticating information can be something a user knows, like a password; something a user has, like a smart card; or something
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!