1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
2 years ago
6

Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent

this situation from occurring?
Computers and Technology
1 answer:
Yuki888 [10]2 years ago
4 0

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

You might be interested in
What electronic appliances at your home / school can be controlled remotely? Name any 4
Paladinen [302]

Answer:

Hi how are you doing today Jasmine

8 0
2 years ago
Select all the correct answers.
gtnhenbr [62]

Answer:

If you want to learn coding than get a game and look at the code inside.

Explanation:

I sugest terraria

8 0
3 years ago
Which tool is used to create a basic web page using HTML?
GuDViN [60]

Answer:

A text editor

Explanation:

A text editor is an application that enables a programmer edit and create codes in a programming language. These codes are then executed to do just what the programmer wanted them to do.

5 0
2 years ago
Read 2 more answers
While ________ is centered on creating procedures, ________ is centered on creating objects. Procedural programming, class progr
AlexFokin [52]

Answer

Procedural programming, Object-oriented programming

Explanation

Procedural programming is a type of computer programming language that specifies a series of well structured steps and procedures  within its development period of time. It contains a systematic order of statements, functions and commands to complete a computational task or program. It is centered on creating procedures. While object oriented programming is a programming language that is centered on creating objects rather that actions and data rather than logic.. It has four principles which are inheritance, polymorphism, abstraction and Encapsulation


4 0
3 years ago
To mitigate the effects of most of the common network threats including disruption, destruction and disaster, companies are begi
almond37 [142]

Question:

To mitigate the effects of most of the common network threats including disruption, destruction and disaster, companies are beginning to migrate their servers, networking devices and data into professional datacenters. This is called

A) Colocation

B) SAAS

C) Peering

D) Clustering

E) Server Farming

Answer:

The correct answer is A) Colocation

Explanation:

Colocation as already defined is the voluntary relocation of all network facilities to a data centre so as to reduce the risks of disaster, disruption, destruction, intrusion whilst increasing security, flexibility and scalability at a lower cost.

As the world gets more digitized, datacentres are getting more patronage. The sales figures show this.

Cheers!

6 0
2 years ago
Other questions:
  • Which consumer document is most likely to help you if you have trouble figuring out how to operate a device
    6·1 answer
  • Davia draws a shape with 5 sides. two sides are each 5 inches long. two other sides are each 4 inches long. the perimeter of the
    15·1 answer
  • The programs that provide the infrastructure and hardware control necessary for the computer and its peripheral devices are call
    11·1 answer
  • Which one of the following items is an example of software?
    15·1 answer
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • A(n) ________ is a specific type of computer program that manages all programs on a computer.
    8·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • How many levels of full body protective clothing are there? A. Four B. Seven C. Six D. Two
    14·2 answers
  • State the functions of all the parts of the computer​
    14·1 answer
  • Juan wrote a loop to print all the prime numbers between 1 and 100. But instead of stopping at 100, it continues on and on forev
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!