1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
8

(Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then

browses a website and logs in to post a comment.
Arrange the protocols in the order they are used.
TCP for email
IP for website
HTTP
LDAP
IP for email
POP3
TCP for website
Computers and Technology
1 answer:
Marizza181 [45]3 years ago
6 0

Answer:

When Patricia checks her email use:

POP3

TCP

IP

When Patricia brows a website and log in to post a comment use:

HTTP

TCP

IP

LDAP

Explanation:

Email protocol

Patricia starts to check her email, the email application uses the protocol POP3.

The protocol TCP makes a connection with the server and transport the data.

Patricia receives her emails with the protocol IP on her computer.

Website protocol

Patricia started to surf and the protocol HTTP makes a connection with the internet.

The protocol TCP makes a connection with the server and transport the data.

With the protocol IP, she receives the website data.

With the protocol LDAP, Patricia makes a login to post the comment.

You might be interested in
You defined a class and saved it as shoe.py.
alexandr1967 [171]

Answer:

Import shoeClass from

Explanation:

7 0
3 years ago
Read 2 more answers
PLEASE HELP ASAP!!!!
MArishka [77]
It won't let me send the answer. It says incorrect answer even though it's not but refer to these notes at the top.

3 0
3 years ago
While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
Darina [25.2K]

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

4 0
3 years ago
Thoughts on copyright?
Nataliya [291]

Answer:

Don't do it. People will sue you even though it was put on the internet.

Explanation:

7 0
3 years ago
Which career involves analyzing various factors that influence the customer decision-making process?
Olegator [25]

Which career involves analyzing various factors that influence the customer decision-making process? Marketing and advertising. When you work in the marketing and advertising career field, you are influencing the customers decision-making process by trying to get them to purchase your product. There are different ways to gain the loyalty of a customer and making sure that your product grabs their attention is necessary.

5 0
3 years ago
Other questions:
  • Which of the following is NOT a common GUI component? O a. Label b. Button c. Key press d. Text box
    12·2 answers
  • Behaving in an acceptable manner in a workplace environment is referred to as workplace etiquette.
    12·2 answers
  • Which Game Is Better & Favorite For You?
    12·2 answers
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • Phân tích 5 phương hướng nhiệm vụ phát triển nông -lâm -ngư nghiệp ở nước ta hiện nay
    11·1 answer
  • How to get the lightning round in dares of eternity
    5·1 answer
  • Which of the following is not harmful to the computer?<br> a) Trojan<br> b) Rootkit<br> c)Malware
    15·1 answer
  • The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!