1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
2 years ago
9

Examples of ________, which is hosted on a web site, include e-mail, word processing, tax preparation, and game programs.

Computers and Technology
1 answer:
Keith_Richards [23]2 years ago
4 0

Answer:Web Application

Explanation:Web hosting is more or less like having an ordinary computer in the cloud in order share information and resources with others world wide.One cannot make effective use of a computer without software applications . Similarly hosting just normal html pages and documents on a server cannot help increase productivity,hence the creation of cloud computer applications also known as "Web Apps (Web Applications)" to aid boost productivity and information dissemination via quality task automations.

You might be interested in
A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
alexgriva [62]

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

4 0
3 years ago
What does the https in a link stand for?
ExtremeBDS [4]
<span>HTTPS stands for Hypertext Transfer Protocol Secure</span>
5 0
4 years ago
Read 2 more answers
Some of the drawbacks to the effectiveness of NSM include all of the following, except which one?
Sunny_sXe [5.5K]

Answer:

The answer is B: Differences in operating systems between the NSM server and other servers

Explanation:

All the evils on your network can be conquered effectively with the proper use NSM. NSM data equips CIRTs to detect and respond to cyber- attacks. With NSM, security analysts are able to discover intrusions early on in the process. Having highlighted all these positives, NSM encounters difficulties when faced with all of the above options apart from B.

5 0
3 years ago
Which statement is true of both credit cards and debit cards?
ycow [4]

Answer:

C)

Explanation:

6 0
1 year ago
What does the ‘SIM’ in the SIM card stand for?
hram777 [196]

Answer:

It stands for Subscriber Identity Module

Explanation:

<em>SIM cards are computer chips that store data and enable you to access your network. That implies you may call, text, and connect to mobile internet services such as 4G. SIM cards are  portable, and you can store messages, contacts, and emails to them. SIM cards connect a specific account to a specific phone; they inform the phone network firm which account is linked to which phone. Customers are typically referred to as subscribers by network operator providers. A SIM card is a type of user card that allows your phone to connect to a network. Also, if you had a phone accidents and you can s imply insert the SIM card in another phone and you may make a call or utilize your data. Just make sure they each utilize the same size SIM card.</em>

4 0
2 years ago
Read 2 more answers
Other questions:
  • Janelle is organizing an outline for an investigative report about the benefits of taking a 30-minute walk each day. which of th
    11·2 answers
  • (Palindrome integer) Write the methods with the following headers // Return the reversal of an integer, i.e., reverse(456) retur
    9·1 answer
  • Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant
    14·1 answer
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • Look at the network topology. What will happen with the other computers if the computer breaks at the RED X?
    8·1 answer
  • Gun to yo head any last words??
    10·2 answers
  • What when can you expect technology to be effective?
    12·1 answer
  • Pls awnser if awnser is wrong I will unmark brainliest
    5·1 answer
  • Draw a flow chart to print gratest number among two .​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!