1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
2 years ago
9

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet?

Computers and Technology
1 answer:
Morgarella [4.7K]2 years ago
6 0

You can search stuff using your search engine. Additionally, you can enter an IP associated with a domain to go to a website. Other than that you can also run hostnames, IP's with a port to access certain localized functions from your computer or the world wide web.

You might be interested in
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
Which of the following are associated with Public Key encryption? (Select all that apply.) Question 2 options: a) Asymmetric key
tatiyna

Answer:

A- ASYMMETRIC KEYS

Explanation:

Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.

Asymmetric keys allows someone to send their public key in an open and insecure channel.

3 0
3 years ago
Multiple Choice
podryga [215]

Answer:

a

Explanation:

Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. ... Proximity Operators (with, near and others) can also help you in searching.

5 0
3 years ago
Marsha receive an email saying that she won a free cruise to Alaska. What Marsha didn’t realize is that the email was fake and c
Gre4nikov [31]

Answer:

I think the answer is B

Explanation:She sent it to her friends not knowing it would give there computers a virus too.

4 0
3 years ago
Read 2 more answers
A previously saved labels report can be accessed from the
Tcecarenko [31]

C. is the answer to that question

6 0
3 years ago
Other questions:
  • What are some examples for Environmental Technology?
    5·2 answers
  • Write a short program using a while loop which will display all of the even numbers starting with 12 and ending with 86. (test y
    10·1 answer
  • What are the details of frame transmission andreception that LAN interface handles?
    7·1 answer
  • Adding functionality to a Button is easy when you use the IDE. After you have dragged a Button onto a Form, you can ____ it to c
    7·1 answer
  • How many occupational groups are there in the SOC system?
    12·1 answer
  • Point out the correct statement:_____.
    6·1 answer
  • While in class you were introduced to the varieties
    7·1 answer
  • Please use the tables in the flights database. Your deliverable should include a single SQL query that I can run against a "fres
    5·1 answer
  • Write Python code that prompts the user to guess Heads or Tails. Your code will continue to display the results and prompt the u
    5·1 answer
  • Yusuke has been a fan of online games for as long as she can remember. She particularly loves the role-playing games that allow
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!