The ________ protocol is used to deliver requested web pages to a computer.

A. HTML
B. P2P
C. VoIP
D. HTTP


Answer: D

Computer Science & Information Technology

You might also like to view...

Suppose the bus between memory and secondary storage is experiencing heavy page traffic.Does this imply thrashing? Explain.

What will be an ideal response?

Computer Science & Information Technology

Match the term with the correct item below. (Not all terms are used.)

A. A _______________ is provided to a potential employer to assist in checking your qualifications. B. C. A resume in a Word document attached to an e-mail is an example of a(n) __________. D. A keyword search uses  __________ to match keywords. E. F. G. H. To determine the specific qualifications required for a job that is available, review the  __________. I. A(n) __________ is used to determine which companies may be the best prospects for your job search. J.

Computer Science & Information Technology

What is a rootkit?

What will be an ideal response?

Computer Science & Information Technology

What condition would prevent an administrator from creating a new VMFS3 datastore on an ESXi 6.x host using the vSphere Web Client?

A. A VMFS3 datastore cannot be created on an ESXi 6.x host. B. The VMFS3 kernel module is not loaded. C. A VMFS3 datastore cannot be mounted on an ESXi 6.x host. D. VMFS3 datastores are not compatible with virtual machines created on an ESXi 6.x host.

Computer Science & Information Technology