________ is a communications protocol used to send information over the web.

a. HyperText Markup Language (HTML).
b. URL (Uniform Resource Locator).
c. Web 2.0
d. TCP/IP


A

Computer Science & Information Technology

You might also like to view...

If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal

Indicate whether the statement is true or false

Computer Science & Information Technology

The functions and variables defined in a class are called functional members

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the result of an access control management process that adds new capabilities to users as their job tasks change over time, but does not perform a regular reassessment of the assigned authorization?

A. Collusion B. Collision C. Privilege creep D. Fraud and abuse

Computer Science & Information Technology

When analyzing the feedback on an evaluation form, a trainer should look for ____.

A. items with the lowest ratings B. items with the highest ratings C. items with a mixture of high and low rating D. items where there is a pattern of low ratings

Computer Science & Information Technology