When a browser requests files from a web server, it uses __________.

A. File Transfer Protocol (FTP)
B. Hypertext Transfer Protocol (HTTP)
C. RealTime Transport Protocol (RTP)
D. Dynamic Host Configuration Protocol (DHCP)


Answer: B

Computer Science & Information Technology

You might also like to view...

The equation used to calculate values in a cell is called a command.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the best safeguard against zero-day attacks?

A. Enable auditing. B. Regularly inspect all logs. C. Update the hardware and software as soon as new updates are released. D. Implement backups.

Computer Science & Information Technology

What happens to the NTFS permissions applied to a folder when the folder is moved to a different folder in the same volume?

A. It loses its permissions entirely, and inherits permissions from the new parent folder. B. It keeps its permissions, but also inherits the permissions from the parent folder. C. It keeps its previous permissions settings in the new folder. D. The user is prompted to decide whether to keep permissions or inherit permissions.

Computer Science & Information Technology

Forgetting to initialize and alter the loop control variable are common mistakes that programmers sometimes make.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology