1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
4 years ago
7

Marie uses a browser to visit a blog. What is the unique identifier of the blog? A. web page B. website C. web address D. email

E. domain
Computers and Technology
2 answers:
lianna [129]4 years ago
7 0
Web address or domain that's just my opinion
Fudgin [204]4 years ago
7 0

The answer on Plato is Website

You might be interested in
How do you return a value from a function?
rjkz [21]

Answer:

return instruction used to return a value from a function.

Explanation:

Function is a block of statement which perform the special task.

Syntax for define a function:

type name(parameter_1, parameter_2,...)

{

  statement;

return variable;

}

In the syntax, type define the return type of the function. It can be int, float, double and also array as well. Function can return the array as well.

return is the instruction which is used to return the value or can use as a termination of function.

For return the value, we can use variable name which store the value or use direct value.

4 0
3 years ago
What is one similarity between low-and high-level programming languages? (5 points)
aleksandr82 [10.1K]

Answer:

Both high and low level computer languages are used to communicate directly with a computer, so the answer is D.

Explanation:

5 0
3 years ago
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following opti
lions [1.4K]

Answer:

Option B is the correct answer for the above question.

Explanation:

DAP is a protocol technology that is used for the client and discovered by X.500 in 1988. Its use for the client host on the network. The operation of this protocol is --- Read, Bind, Search, List, Compare, Add and Modify the data.

The above question asked about the protocol which is searched by X.500 and used for the clients. So the answer is DAP which is stated by Option B hence this option is correct while other is not because--

  • Option 'A' states about DIB which is not a protocol. It is used by X.500.
  • Option C states about DIT which is not used by X.500.
  • Option D states about LDAP which can be used for client or server.

7 0
3 years ago
What is meant by instruction pipelining in RISC processor? Whatare
Evgesh-ka [11]

Answer:

Explanation:

The instruction pipelining refers to various stages the instruction has to go through for the full execution of the instruction. Each instruction undergoes various stages in the execution, they are Instruction Fetch, Instruction Decode, Address Generator, Data Fetch, Execution and Write Back. Not every instruction may go through all the stages stated above. Pipelining exploits the parallelism in the execution of instructions (executing multiple instructions simultaneously ). Each instruction might be at different stage in the execution of program. It can be a 3-stage pipelining or 5 stage pipelining.

The implementation of Pipelining is a complex procedure.

In branch instructions, the complexity increases with the number of stages of pipeline.

7 0
3 years ago
Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive
galina1969 [7]

Answer:

Option(A) i.e "Security information and event management (SIEM)" is the correct answer for the given question.

Explanation:

The security information and event management (SIEM) is the product of the software and it gives the service of security.The security information and event management (SIEM) is the combination of security information management and security event management (SEM). The main advantage of Security information and event management (SIEM) provides real-time security alerts.

The Issac uses  Security information and event management (SIEM) and perform the log review for his organization. The Security information and event management review the massive amount of data and also provide better security

Following are the description why the others options are incorrect

  • Intrusion prevention system (IPS) is used for the threating purpose it checks the threats in the network flow so according to question this option is incorrect.
  • Data loss prevention (DLP) is used for the purpose of data loss so according to question this option is incorrect.
  • A virtual private network (VPN) is used to connect the network virtually so according to question this option is incorrect.
7 0
3 years ago
Other questions:
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • Y’all think Super Drags is good?
    8·1 answer
  • Given two double variables, best value and second best value, write some code that swaps their values. declare any additional va
    13·1 answer
  • NEED HELP ASAP! BRAINLIEST AND 20 PTS TO CORRECT ANSWER!
    14·1 answer
  • How do you determine latitude using an astrolabe?
    11·1 answer
  • The top-down approach is an appropriate strategy for most
    13·1 answer
  • I will upvote....
    10·1 answer
  • Which of the following speeches is an example of a demonstration speech? a. “Who was Abraham Lincoln” b. “The Human Brain and it
    5·1 answer
  • What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URG
    10·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!