Question

1) a uniform resource locator is a) address of the computer that contains the browser software...

1) a uniform resource locator is
a) address of the computer that contains the browser software
b) method of locating via search engine
c) address of a particular host computer and perharps a web page
d) software tool for locating hardware and software resources on the internet

2)a system that uses communication equipment to connect computers and their resources is
a) terminal
b)network
c)CPU
d)connector

3)the protocol describing standard rules for internet communication is
a) TCP/IP
b) web browser
c)ISP
d) LAN

4) which of the following types of software requires a computer to connect to a network
a) word processor
b)database
c)email
d)operating system

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Note:--- Bold option is the answer of the relative question.

Question:---- 1) a uniform resource locator is
a) address of the computer that contains the browser software
b) method of locating via search engine
c) address of a particular host computer and perharps a web page
d) software tool for locating hardware and software resources on the internet

Question:---- 2)a system that uses communication equipment to connect computers and their resources is
a) terminal
b) network
c) CPU
d) connector

Question:---- 3)the protocol describing standard rules for internet communication is
a) TCP/IP
b) web browser
c)ISP
d) LAN

Question:---- 4) which of the following types of software requires a computer to connect to a network
a) word processor
b) database
c) email
d) operating system

Add a comment
Know the answer?
Add Answer to:
1) a uniform resource locator is a) address of the computer that contains the browser software...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • HOMEWORK 4

    Each (1-13) question is 5 points: 1.      How many bits are in a MAC address?2.       3.      How many bits are in an IPv4 IP address? 4.      When using DSL modem to connect to the Internet, the data transmission shares the cabling with what other technology? 5.      Which type of networking cable is more reliable, STP or UTP? Which is used more on LANs? 6.      Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? 7.      Which...

  • Description: In this project, you are asked to install virtualization software on a host computer, install...

    Description: In this project, you are asked to install virtualization software on a host computer, install guest operating system on the virtual machine, and finally set up a web server in the guest operating system. Host Operating System: Your host operating system can be any operating system you are familiar with and have access to. Virtualization Software: VMWare Workstation Player or VirtualBox Guest Operating System: Ubuntu Web Server: Apache Steps: 1. Install Virtualization software a. VMWare Player i. Free download...

  • t is Symmetrie and Asymmeti 08.MAC address is address a) Software address b) Hardware address c)...

    t is Symmetrie and Asymmeti 08.MAC address is address a) Software address b) Hardware address c) Both a) and b) d) None Q9.ICANN handle a) IP addresses b) MAC address c) Both a) and b) d) None Q10.The boundary between network prefix and host suffix is mark as mask, which a) Decrease proficiency b) Makes processing efficient c) Moderate the proficiency d) All of the above

  • F 2. Data mining provides management with daily operational reports: True or False? 3. A Data...

    F 2. Data mining provides management with daily operational reports: True or False? 3. A Data Base Management System (DBMS) function is to-provide a company with F 1. A computer's Operating System (O/s) is always in volatile mode: True or access and control of its Operating System software 4. A computer's Operating System performs the Data Mining function: True or False? ru 5. Data travels via the Internet at 186,282 megabytes per second: Trus or False? 6. The World Wide...

  • Show work. 5. A host computer with an IP address of 10.10.20.5 using a subnet mask...

    Show work. 5. A host computer with an IP address of 10.10.20.5 using a subnet mask of 255.255.192.0 pings a computer with an IP address of 10.10.10.5. What happens to the data packet? a. The data packet is sent to the gateway. b. The data packet is sent to 10.10.20.192. c. The 10.10.10.5 is not in the same LAN; therefore, the data packet is sent out as a broadcast. d. The data packet is sent to the 127.0.0.1 network. e....

  • Protocols (8 points) Aliens have tampered with your computer! They garbled some of the software responsible...

    Protocols (8 points) Aliens have tampered with your computer! They garbled some of the software responsible for your internet communica tions. You know that only one of the layers of the protocol stack has been affected. Which layer would you suspect in each of the following scenarios? a. You can view the source of HTML pages, but they don't display properly. b. You cannot seem to connect to any other computer at all. c. You can ping a computer across...

  • Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on...

    Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. It allows you to talk to the machine. A) hardware protocol B) software protocol C) machine control architecture D) instruction set architecture 12. A ________ consists of an arithmetic logic unit and a control unit. A) processor B) computer C) register D) program 13. ________ are typically used by companies for specific applications such as data...

  • A. Multilayer switch An encrypted tunnel across an unsecured infrastructure. A piece of software or a...

    A. Multilayer switch An encrypted tunnel across an unsecured infrastructure. B. Broadcast domain A piece of software or a non-inline device that detects suspicious activity, logs the action, sends an alert, and can even notify another device to take corrective action. C. PuITY A switch that operates at both Layer 2 and Layer 3 of the OSI model.D. Client/server  A group of computers that receive each other's broadcast messages.E. Peer-to-peer A VPN protocol that has clients connect to the VPN server using a standard messages...

  • Group B Word Pool IL. A computer application that allows the user to enter demographic information,...

    Group B Word Pool IL. A computer application that allows the user to enter demographic information, schedule appointments, maintain lists of computer network data server local area network dumb terminal. insurance payers, perform billing tasks, and generate reports 12 Asystem that links personal computers and peripheral devices to share information and resources router practice management software redundancy Ethernet wide area network 13. Peripheral computer hardware that connects to the router to provide Internet access to the network or computer modem...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT