1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
13

Web browsers communicate with web servers using the ____ communication protocol.

Computers and Technology
1 answer:
jolli1 [7]3 years ago
7 0
It is the HTTP protocol.
You might be interested in
When you're working with a word processing document and you press the DEL Key what happens
wariber [46]
<span>The character to the right of the cursor is deleted. </span>
4 0
3 years ago
Read 2 more answers
What is a benefit of starting a new business from scratch?
skad [1K]

Answer:

You can do what you want

Explanation:

The sky is the limit

3 0
3 years ago
___ involves connecting geographically remote computers into a single network and combining the computational power of all compu
insens350 [35]

Answer:

grid computing

Explanation:

<h2><u>Fill in the blanks </u></h2>

<u>grid computing</u>  involves connecting geographically remote computers into a single network and combining the computational power of all computers on the network. It takes advantage of the the fact that most computers use their central processing units on average only 25 percent of the time, leaving 75 percent of their capacity available for other tasks. A super computer Nanotechnology A workstation Grid computing Green computing

6 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
JAVA
Umnica [9.8K]

import java.util.Scanner;

public class JavaApplication58 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter a positive integer:");

       String num = scan.nextLine();

       for (int i = num.length()-1; i >=0; i--){

           System.out.println(num.charAt(i));

       }

       

   }

   

}

I hope this helps!

5 0
3 years ago
Other questions:
  • You may be guilty of plagiarism even if
    13·1 answer
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • What time does walmart deposit paychecks?
    5·1 answer
  • How do you change colors for presentation to blue warm in power point?
    11·1 answer
  • Firefox, Chrome, Opera, and Safari are examples of
    15·1 answer
  • Which of the following is a sample IPv4 address?
    14·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Which of the following is NOT true about procedural abstraction?
    9·1 answer
  • What is the initial step to exploring solutions to a problem?
    15·2 answers
  • Explain why you would use the soft on/off jumper when working on ATX system
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!