1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
3 years ago
11

Why do you usually find domain names instead of IP addresses in a URL? Select one: a. An IP address would make your web page loa

d more slowly b. A domain name is easier to remember C. An IP address is not guaranteed to get you to the right server computer d. Domain names are free, while IP addresses are very expensive ​
Computers and Technology
1 answer:
Gnom [1K]3 years ago
3 0

Answer:

b

Explanation:

for exaple brainly.com is easy to remember instead of 104.17.73.91

You might be interested in
When saving a memo you created in Word, which of the following extensions is automatically assigned to the document?
Lena [83]
.docx is the default file extension on a Word doc.
6 0
4 years ago
Read 2 more answers
What does the third argument (3) refer to in the following formula: VLOOKUP(10005, A1:C6, 3, FALSE)
zzz [600]

Answer:

The answer is "number of the column containing the return value".

Explanation:

In Excel, the "VLOOKUP" method is used to perform the vertical search by looking for both the value during the user table and retrieving the number of the index number location in the same row. It is a built-in function, which is classified as a Lookup or Reference worksheet function, and the following function can be defined as follows:

  • In the 1st parameter, it is used to watch the value for the match.  
  • In the 2nd parameter, it is used to search the table.
  • In the 3rd parameter, it is used as the column number representing the return value.  
  • In the 4th parameter, it is used to return only if the same match is found.
5 0
3 years ago
WHAT 1 + 1 ???? ???????????????????
antiseptic1488 [7]
The answer to this is 11
5 0
3 years ago
Read 2 more answers
Write a program that accepts a phrase of unspecified length on the command line. For example: prompt% letter print Operating Sys
Sedaia [141]

Answer:

Check the explanation

Explanation:

#define _MULTI_THREADED

#include <pthread.h>

#include <stdio.h>

#include <errno.h>

#define           THREADS          2

int               i=1,j,k,l;

int argcG;

char *argvG[1000];

void *threadfunc(void *parm)

{

int *num;

num=(int*)parm;

while(1)

   {

   if(i>=argcG)

   break;

   if(*num ==1)

   if(argvG[i][0]=='a' ||argvG[i][0]=='2'||argvG[i][0]=='i' ||argvG[i][0]=='o' ||argvG[i][0]=='u')

   {

   printf("%s\n",argvG[i]);

   i++;

   continue;

   }

    if(*num ==2)

   if(!(argvG[i][0]=='a' ||argvG[i][0]=='2'||argvG[i][0]=='i' ||argvG[i][0]=='o' ||argvG[i][0]=='u'))

   {

   printf("%s\n",argvG[i]);

   i++;

   continue;

   }

   sched_yield();

   }

return NULL;

}

int main(int argc, char *argv[])

{

pthread_t            threadid[THREADS];

int                  rc=0;

int                  loop=0;

int arr[2]={1,2};

argcG=argc;

for(rc=0;rc<argc;rc++)

argvG[rc]=argv[rc];

printf("Creating %d threads\n", THREADS);

for (loop=0; loop<THREADS; ++loop) {

     rc =pthread_create(&threadid[loop], NULL, threadfunc,&arr[loop]);

}

for (loop=0; loop<THREADS; ++loop) {

   rc = pthread_join(threadid[loop], NULL);

}

printf("Main completed\n");

return 0;

}

The below attached image is a sample output

3 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
2 years ago
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • Write the pseudocode for linear search, which scans through the sequence, looking for ν. Using a loop invariant, prove that your
    14·1 answer
  • Which of the following statements is used to terminate the program when closing the frame?
    5·1 answer
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • You are going to do a bubble sort on the following list. What are the missing members of the list? Select 3 options.
    14·2 answers
  • I really need this done Thank you!!
    6·1 answer
  • A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
    8·1 answer
  • Please help I really need it :(
    12·1 answer
  • Explain the concept of “survival of the fittest”
    15·1 answer
  • Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!