1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
10

_____ is a valid URL, or internet address. In this URL, ______ indicates the protocol.

Computers and Technology
1 answer:
Natalija [7]3 years ago
7 0

Answer:

1. B.http://www.example.com

2. A. http

Explanation:

You might be interested in
What is the name for the last word on a dictionary page?
kakasveta [241]

Answer:

bbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

bbbbbbbbbbbbbbbbbbbbbbbbb

8 0
3 years ago
What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
Morgarella [4.7K]
Go to the Start menu and then delete the file <span>is the simplest way to permanently get rid of an unwanted file</span>
5 0
4 years ago
What is the purpose of HTML?
Basile [38]
You can style and structure with it so it’s either one of those
3 0
3 years ago
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
Can we opne a website form PowerPoint slide ​
Phoenix [80]

Answer:

Yes

Explanation:

Type in the link, play the presentation and click the link. Or hover over the link and press ctrl + click at the same time. (Don't know if I got the last part right)

3 0
4 years ago
Read 2 more answers
Other questions:
  • While the term ________ refers to an elaborate solo song frequently used in opera, the term ________ refers to sung dialogue fre
    12·1 answer
  • In Microsoft word,when you highlight existing text you want to replace ,you’re in?
    12·1 answer
  • What type of device is the printer?
    13·2 answers
  • A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
    13·1 answer
  • The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected by stress.
    10·1 answer
  • Riodic Table
    6·1 answer
  • Which of the following would be a show stopper for the development of an enterprise mobile app? The app demands data throughput
    11·1 answer
  • Disadvantages of Batch<br>operation system​
    5·1 answer
  • An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in
    15·1 answer
  • true/false: the american standard code for information (ASCII) is a code that’s allows people to read information on a computer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!