Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. How to use Http and World Wide Web?
Http and World Wide Web
One of the most frequently used services on the Internet is the World Wide Web (WWW). The application protocol which makes the web work is Hypertext Transfer Protocol or HTTP. Don't confuse this with the Hypertext Markup Language (HTML). HTML is language used to write web pages. HTTP is the protocol which web browsers and web servers use to communicate with each other over Internet. It's an application level protocol since it sits on top of the TCP layer in the protocol stack and is used by specific applications to talk to one another. In this case applications are web browsers and web servers.
HTTP is a connectionless text based protocol. Clients (web browsers) transmits requests to web servers for web elements like web pages and images. After request is serviced by a server, connection between server and client across the Internet is disconnected. A new connection should be made for each request. Most protocols are connection oriented. This means that two computers communicating with each other keep connection open over the Internet. HTTP doesn't however. Before an HTTP request can be made by a client, a new connection should be made to the server.
Handshake control of data transfer during an input operation: . Handshake control of data transfer during an output operation o Interface to CPU and Memory o
Explain about Magnetic tape a) They are mostly used for keeping files of data b )It is one of the cheapest and slowest methods for storage
What is the difference between Swapping and Paging? Swapping: Entire process is moved from the swap device to the major memory for implementation. Process size must be less t
What is macro call? Explain. Macro call: While a macro name is used along with a set of actual parameters this is replaced through a code generated from its body. Such code
Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft
Describe the term- System analyst Design Once analysis has taken place and systems analyst has some idea of the scale of problem and what needs to be done, subsequent stage is
Q. Show the instruction execution by using the micro-operations? A simple instruction can require: Instruction fetch: fetching instructions from the memory. Instruc
Q. What do you mean by shopping bots? ANSWER: A shopping bot or buyer agent is an intelligent agent on a Web site that assists you, the customer, search the products and servic
write a short note on the tri state ttl inverter
addition c program for token separation
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd