1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
5

Give the full form of http​

Computers and Technology
1 answer:
astraxan [27]3 years ago
8 0
Hypertext Transfer Protocol
h is for hyper
the T in text is the first T
transfer is the second T
and P is for protocol

HTTP hope that helps
You might be interested in
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
Python Programming
Phoenix [80]

The python program that creates a Bankaccount class for a Bank ATM that is made up of the customers and has a deposit and withdrawal function is given below:

<h3>Python Code</h3>

# Python program to create Bankaccount class

# with both a deposit() and a withdraw() function

class Bank_Account:

def __init__(self):

 self.balance=0

 print("Hello!!! Welcome to the Deposit & Withdrawal Machine")

def deposit(self):

 amount=float(input("Enter amount to be Deposited: "))

 self.balance += amount

 print("\n Amount Deposited:",amount)

def withdraw(self):

 amount = float(input("Enter amount to be Withdrawn: "))

 if self.balance>=amount:

  self.balance-=amount

  print("\n You Withdrew:", amount)

 else:

  print("\n Insufficient balance ")

def display(self):

 print("\n Net Available Balance=",self.balance)

# Driver code

# creating an object of class

s = Bank_Account()

# Calling functions with that class object

deposit()

s.withdraw()

s.display()

Read more about python programming here:

brainly.com/question/26497128

#SPJ1

8 0
2 years ago
Cyber vulnerabilities to dod systems may include
Ivan

Cyber vulnerabilities to dod systems may include all of the above Options.

<h3>What is Cyber vulnerabilities?</h3>

In cybersecurity, a vulnerability is known to be any kind of weakness  exist with the aim to be exploited by cybercriminals to be able to have unauthorized access to a computer system.

Note that in the case above, Cyber vulnerabilities to dod systems may include All of the above Options.

Learn more about cyber vulnerabilities from

brainly.com/question/7065536

#SPJ11

6 0
2 years ago
A software development _____________ provides a framework for designing, writing, and testing software.
Ivenika [448]
I think methodology
4 0
3 years ago
How can you get feedback on your presentation from someone who is far away?
My name is Ann [436]

Answer:

C. Record your presentation...

I think this because if you want feedback you would definetly talk and record your presentation so the person can give you a clear response

8 0
3 years ago
Read 2 more answers
Other questions:
  • What can be used to provide a checklist of user tasks that must be included in the interface design?
    6·1 answer
  • What type of formatting does the clip below demonstrate
    6·1 answer
  • In general, font size for software-generated presentation slides should be no smaller than __________ points.
    8·1 answer
  • Which best describes the benefits of renting a home
    12·2 answers
  • What factors contribute to food wastage
    12·1 answer
  • Usually written in block style with body text aligned along the left margin
    5·2 answers
  • In this first journal assignment, you will explore the role of testing in the SDLC. You will explain the role and importance of
    9·1 answer
  • In the picture below
    10·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • Weaknesses about ICT Technician
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!