1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
2 years ago
13

Which statement describes a difference between front-end and back-end databases?

Computers and Technology
2 answers:
anastassius [24]2 years ago
8 0

Answer:

B is the answer

Explanation:

Some one in the first response said it not me but he just saved me from a C

Westkost [7]2 years ago
6 0

Answer:

So a statement could be the front-end is what we see and the back-end is what we don't see, the behind the scenes. Like a play, we see the characters and them acting out a story but we dont see who is doing the lights, playing the music, fixing the costumes and makeup etc..

Explanation:

The term front-end means interface while the term back-end means server. So imagine you go on your social media app, what you can see like your friends list and your account and the pictures you post, who liked the pictures and all of that is called the front-end and is what <em>you</em> as a user can interact with; front-end development is the programming that focuses on the visual aspect and elements of a website or app that a user will interact with its called in other words the client side. Meanwhile, back-end development focusing on the side of a website users can't see otherwise known as the server side, its what code the site uses and what it does with data and how a server runs and interacts with a user on whatever device surface they're using.

You might be interested in
____ is concerned with the security of computers or devices that are part of a network infrastructure.
Maru [420]

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here brainly.com/question/14407522

#SPJ4

5 0
2 years ago
Select the correct answer.
storchak [24]

Answer:

B. Planning

Explanation:

I believe the developer establishes the project goals in the planning phase.

6 0
4 years ago
What are the five types of alignment in Word?
Basile [38]
There are four types of alignment in word.
Left-aligned text
Right-aligned text
Center-aligned text
Justified text
6 0
4 years ago
Read 2 more answers
A folder has been shared with other users and set to read-only. what does this mean for users?
fomenos
It means they cannot make changes inside those folders and they don't have permission to execute files within it.
5 0
4 years ago
Read 2 more answers
Jim has listed stages of the product life cycle in his presentation. Which slide element can Jim use to make the items in the li
Sergeeva-Olga [200]
I believe the correct answer is C.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Computer-integrated manufacturing (CIM) includes manufacturing systems that have:
    7·1 answer
  • Which file is used to determine which tty devices the root user is allowed to log in to?
    8·1 answer
  • What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
    14·1 answer
  • How many different messages can be transmitted in n microseconds using three different signals if one signal requires 1 microsec
    12·1 answer
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • Given the following: int funcOne(int n) { n *= 2; return n; } int funcTwo(int &amp;n) { n *= 10; return n; } What will the follo
    15·1 answer
  • Why does this happen to me?
    14·1 answer
  • Give five examples of physical networking.
    15·1 answer
  • Match the following internet related terms to their definition
    13·1 answer
  • Are they going to make season two of Midori Days
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!