1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
2 years ago
14

What are web protocols.

Computers and Technology
2 answers:
RoseWind [281]2 years ago
7 0

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Mashutka [201]2 years ago
6 0

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

You might be interested in
Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
boyakko [2]

Answer:

Option 1: May crash at runtime because it can input more elements than the array can hold

Explanation:

Given the code as follows:

  1.        int[] a = {1, 3, 7, 0, 0, 0};
  2.        int size = 3, capacity = 6;
  3.        int value = cin.nextInt();
  4.        while (value > 0)
  5.        {
  6.            a[size] = value;
  7.            size++;
  8.            value = cin.nextInt();
  9.        }

From the code above, we know the <em>a</em> is an array with six elements (Line 1). Since the array has been initialized with six elements, the capacity of the array cannot be altered in later stage.

However, a while loop is created to keep prompting for user input an integer and overwrite the value in the array started from index 3 (Line 4- 9). In every round of loop, the index is incremented by 1 (Line 7). If the user input for variable <em>value</em> is always above zero, the while loop will persist.  This may reach a point where the index value is out of bound and crash the program. Please note the maximum index value for the array is supposedly be 5.  

8 0
3 years ago
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the
GarryVolchara [31]

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

3 0
2 years ago
Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
Gelneren [198K]

The correct answer is A: Ctrl and Page Up or Page Down keys.

Ctrl + Page Down - from left-to-right

Ctr + Page Up - from right-to-left

3 0
3 years ago
Read 2 more answers
There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea
Art [367]

Answer:

i dont know

Explanation:

5 0
2 years ago
Evaluate the advantages and disadvantages of cloud computing.
rewona [7]

Answer:

The advantages and disadvantages of the given instance are described below.

Explanation:

<u>Advantage</u>:

  • Cost reductions are the greatest advantages of cloud computing. It lets users conserve considerable capital costs and they wouldn't need any actual hardware expenditure.

<u>Disadvantage</u>:

  • If you operate in something like a cloud system, your program is operating on a platform that offers services to these other organizations at around the same time.
7 0
2 years ago
Other questions:
  • _____ is a protocol used by e-mail clients to download e-mails to your computer.
    15·1 answer
  • A _____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
    13·1 answer
  • Which technique helps you look confident as a speaker?
    15·1 answer
  • Consider an error-free 64 kbps satellite channel used to send 512 byte data frames in one direction, with very short acknowledge
    12·1 answer
  • Ile 1 cm<br> ?<br> 50 m<br> The an
    5·2 answers
  • Instructions: Use the tables below to answer the questions that follow:
    14·1 answer
  • You can find synonyms and disciplinary jargon in the ______, _______, and ______ in your search results. You can then use these
    13·1 answer
  • You began a small mobile app company. To help market your apps, you create a social media site. The site allows users to join co
    15·1 answer
  • Software is the brain of computer. Explain this starement
    5·1 answer
  • The Jacquard Loom used ______________ to change the operation of the loom.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!