1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
3 years ago
12

In internet terminology, what is the term, .com, called?

Computers and Technology
2 answers:
polet [3.4K]3 years ago
8 0
I believe what you're looking for is domain. 
iris [78.8K]3 years ago
6 0
".com", ".ca", ".net" and "org" are all examples of domains.

Hope this helps! A thanks/brainiest answer would be appreciated :)
You might be interested in
Which code snippet could be used to print the following series?
GaryK [48]
C is the answer, I think
7 0
2 years ago
Jennifer has written a business report. What should be her last step before she submits the story for publication?
Montano1993 [528]
Revising and editing because it makes the report look sharp and business like.
5 0
3 years ago
Read 2 more answers
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
A _____ is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-
SOVA2 [1]
Trojan horse
....................
6 0
3 years ago
Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
abruzzese [7]
"Avoiding sarcasm" and "using appropriate language" make professional online communication more effective. Not all people immediately understand one's sarcasm especially someone you recently knew. They may misinterpret the message you're giving so better say something straightforward to make yourself clear. A place where people can easily gather, the internet can make people against you if you're displaying rude and foul comments. Failure to communicate will then follow. If you follow these two guidelines, you're going to be saved from all the troubles.
8 0
3 years ago
Other questions:
  • A viral video is one that can infect your computer with malware. <br> a. True <br> b. False
    6·1 answer
  • Samira works for a large U.S. company that has factories all over the world. Samira returned to the U.S. after visiting several
    9·1 answer
  • An application with which you can perform calculations on numbers and work with other data
    8·1 answer
  • When pointed over a text within a paragraph, the cursor takes the shape of a/an
    10·1 answer
  • Why is it NOT a good practice to save everything on the desktop?
    6·2 answers
  • Does trend in computing important for organization management?​
    8·1 answer
  • click attachment to see correct answer. Which agencies run the Landsat Program? The Landsat program is run by ___ and ___.​
    11·1 answer
  • In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
    11·1 answer
  • ___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-t
    10·2 answers
  • // This pseudocode is intended to describe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!