1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
12

Explain Http and Ftp​

Computers and Technology
1 answer:
larisa86 [58]3 years ago
4 0

Answer:

***HTTP is a protocol which allows the fetching of resources, such as HTML documents. It is the foundation of any data exchange on the Web and it is a client-server protocol, which means requests are initiated by the recipient, usually the Web browse.

**ftp or File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server.

You might be interested in
FREEE POINTS
BigorU [14]

Answer:

Thank you that's so very kind of you. Hope your having a good day.

3 0
3 years ago
Read 2 more answers
Which of the following is a special-purpose computer that functions as a component in a larger product?
Dominik [7]

Answer:  

Embedded Computer

Explanation:

  • An embedded computer is designed to perform a certain function and it is a component of a larger system.
  • An embedded computer has a dedicated function within a larger system and is incorporated as a part of a complete system rather than being a stand alone computer.
  • It is a microprocessor, micro controller based real time control system.
  • Its a combination of hardware and software that have a dedicated function to achieve a specific task. The also have peripheral devices for communication purposes.  
  • Digital Camera , ATM, Calculator, Digital Watch , Self-autonomous Vehicles, Security Camera , Washing Machine , Mp3 player, Microwave Oven , Fire Alarm, Smart Phone,Vending Machines, networking hardware like dedicated routers etc are examples of embedded systems.
  • Embedded computers are less expensive to produce, consumes less power, easier to maintain, do not require remote maintenance and easily customizable.

4 0
3 years ago
write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
USPshnik [31]

The code below is written in javascript which gives us the integer,

<h3>The function code is</h3>

function solution (num){


//Javascript function


var x=0,sum=0,a,b;


var d=""; //variable declaration


var digits = num.toString().split('');


var Individual = digits.map(Number);


//console.log(Individual);


for (var i=0;i<Individual.length;i++)


{//For loop


x=x+Individual[i];


}


var y=x*2;


for(var i=0;i<Individual.length;i++)


{


sum=sum+Individual[i];


d=""+d+Individual[i];


if(sum==y)


break;


if(i==Individual.length-1)


{


i=-1;


continue;


}


}


console.log("the value is "+d);


}


var number = prompt("enter the number");


//Asking user for value...


console.log("the number is");


console.log(number);


solution(num

For more information on javascript, visit

brainly.com/question/16698901?referrer=searchResults

3 0
2 years ago
How to ask for a letter of recommendation via email?
Katarina [22]
This can be done in a number of steps.

1. Prepare your email request early.
2. Choose an appropriate professor
3. Address the letter properly.
4. Put "Recommendation for [your name]" as the subject line.
5. Start the first paragraph by stating what you want.
6. Outline your relationship with the professor.
7. Use the third paragraph as an opportunity to hint at what you'd like the professor to say about you.
8. Give the details.
9. Close with information about how you will follow-up.
10. Thank the professor, whether or not s/he writes the letter.
11. Follow through as promised by delivering necessary materials and sending a reminder
12. Take responsibility for checking with the scholarship program, graduate school, or prospective employer before the deadline
1. Thank the professor again.
5 0
3 years ago
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
3 years ago
Other questions:
  • What is a flash player?
    9·2 answers
  • What is one course of action available in every problem solving process?
    9·2 answers
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • Which of the following is an easy steps to take to avoid ESSD well working on your computer?
    5·1 answer
  • A website is a collection of​
    12·2 answers
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
  • Do you know the energy unit question?
    10·1 answer
  • What is algorithm and how does it works​
    11·2 answers
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • What is an operating system that controls some aspects of the computer?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!