A website's URL can identify all of the following things EXCEPT the ________

A) protocol used to retrieve a web document
B) browser required to view the website
C) file path for additional pages within the website
D) website's domain name

B

Computer Science & Information Technology

You might also like to view...

________ are large groupings of hacked, remote-controlled computers used to distribute and install software

Fill in the blank(s) with correct word

Computer Science & Information Technology

When using asymmetric cryptography, what is the purpose of using the recipient's public key to perform an encryption function on a data set before sending it to the recipient?

A. To prove the identity of the sender B. To verify integrity C. To restrict delivery D. To support non-repudiation

Computer Science & Information Technology