1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
2 years ago
14

What are web protocols.

Computers and Technology
2 answers:
RoseWind [281]2 years ago
7 0

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Mashutka [201]2 years ago
6 0

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

You might be interested in
Examples of ________, which is hosted on a web site, include e-mail, word processing, tax preparation, and game programs.
Keith_Richards [23]

Answer:Web Application

Explanation:Web hosting is more or less like having an ordinary computer in the cloud in order share information and resources with others world wide.One cannot make effective use of a computer without software applications . Similarly hosting just normal html pages and documents on a server cannot help increase productivity,hence the creation of cloud computer applications also known as "Web Apps (Web Applications)" to aid boost productivity and information dissemination via quality task automations.

4 0
2 years ago
What is the computer software? Does a hardware can work without software?
mr Goodwill [35]

Answer:

Hope this helped!

Explanation:

A computer software is anything that lets you work with computers what happens inside it, and hard ware is the actual computer and its parts, so no a computer hardware CANNOT work without a software.

7 0
3 years ago
Read 2 more answers
Carlos had 194 seeds and 11 flower pots he put the same number of seeds in each flower pot which is the best estimate for the nu
Inessa [10]

Answer:

20?

Explanation:

4 0
2 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
Given the following list of numbers, explain how a linear search would be conducted
Ray Of Light [21]

Given the way computers go about completing a linear search for an array of numbers, we can confirm that it would take about six steps to complete the search.

<h3>How do computers perform a linear search?</h3>

When given an array of numbers to search through the linear search method, the computer will follow a logical approach. It will begin at the leftmost number, in this case, the number 7, and then compare each number in the array to the number 52, one by one. When the number finally matches the parameter it is searching for, it will return the answer.

Since in this series of numbers, 52 is the fifth number, the computer will go through the 5 initial steps of comparing each number, and then complete the search with the sixth step which would be returning the index of 52.

Therefore, we can confirm that it would take about six steps for the computer to complete the search using a linear search.

To learn more about linear searches visit:

brainly.com/question/15178888?referrer=searchResults

4 0
2 years ago
Other questions:
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters
    5·2 answers
  • Site won't let me log in and is glitching? Is rainly down?
    15·2 answers
  • " In which software generation did the distinction between systems programmers and other programmers first surface?"
    15·1 answer
  • Project manager Erica is discussing with her team to prepare a document to describe the deliverables and goals of a software pro
    13·1 answer
  • Tech A says that gasoline vapors are lighter than air, so inspection pits do not have a fire hazard like above ground hoists. Te
    9·1 answer
  • 1
    5·1 answer
  • What changes should be made in OSI model(Open System Interconnection).
    5·2 answers
  • Who has a brainpop acct. can i pls use it !
    12·1 answer
  • Explain how mobile phone production could be more sustainable​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!