1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
4 years ago
7

Marie uses a browser to visit a blog. What is the unique identifier of the blog? A. web page B. website C. web address D. email

E. domain
Computers and Technology
2 answers:
lianna [129]4 years ago
7 0
Web address or domain that's just my opinion
Fudgin [204]4 years ago
7 0

The answer on Plato is Website

You might be interested in
Does anyone know to get Google updated if it failed to update?
Yuri [45]
You adapt the situation and overcome the situation, look it up this is not school relevant
4 0
4 years ago
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
In Python, when do we use the str( ) function
pav-90 [236]

Answer:

Both str () and repr () methods in python are used for string representation of a string.

Explanation:

Though they both seem to serve the same purpose, there is a little difference between them. Have you ever noticed what happens when you call a python built-in function str (x) where x is any object you want?

7 0
2 years ago
John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
Romashka-Z-Leto [24]

Answer:

Hardware.

Explanation:

John is operating with Internal Computer Professionals, an organization committed to assisting sector owners to overcome MIS technology problems. John's duties include maintaining and repairing motherboards, wires, and parts of inner devices including DVDs and hard disks. Although John's appointed for hardware fixation.

3 0
3 years ago
Which of the following sentences is most appropriate for written communication at work or with a customer?
Ymorist [56]

there is nothing to choose from

5 0
3 years ago
Read 2 more answers
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • A coordinated collection of fonts,colors,and other viscal effects is called
    10·1 answer
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • How do you bookmark a website in each of the internet browsers?
    9·1 answer
  • Given that n refers to a positive integer, use a while loop to compute the sum of the cubes of the first n counting numbers, and
    12·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • How many feet are in 69 inches
    15·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!