1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
9

Can a Web developer guarantee that data presented is valid? Why or why not?

Computers and Technology
1 answer:
Neko [114]3 years ago
8 0

Answer:

No

Explanation:

If it is coming from a database, it is only as valid as the database makes it. If it is coming from a form, it is only as valid as the answers given by the user who filled in the form.  If it is from a discussion board/forum/blog, again it is only as valid as the person who added the information.

You might be interested in
The purpose of a switch______link is to be able to carry the traffic for all local VLANs.
alekssr [168]

Answer:

Inter switch link

Explanation:

It is the inter switch link( ISL) that enables to carry the traffic for all local VLANs. Functions of VLANs are firstly, a VLAN allows us to take one physical switch, and break it up into smaller mini-switches. Secondly, every virtual switch, called VLAN, is simply a number assigned to each switch port.

6 0
3 years ago
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather
soldi70 [24.7K]

Answer:

Group

Explanation:

A folder assigned to a single user can only be accessed by a single person, to get many users access a folder windows administrator shares a folder to a workgroup. using the simple steps below.

Login as the admin of the system, Right-click on the folder you want to give permission on, after clicking on properties, click on security, add user or group after clicking the edit. and your folder is shared to a group and all users in the group have access to it.

6 0
3 years ago
What filter would only include data from a campaign titled back to school in campaign reports?.
Mkey [24]

Answer:

Custom Include filter with field "Campaign Name" and pattern "back to school"

Explanation:

6 0
2 years ago
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
storchak [24]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

3 0
3 years ago
The fiber-optic cables that span the globe over land and under sea make up the internet _____.
mestny [16]
Faster and cheaper!!!!!!!!!!!!!!!
5 0
3 years ago
Other questions:
  • What mode is generally used when delivering a presentation to an audience?
    8·2 answers
  • 15) the following statement describes government depository librearies , except:
    12·1 answer
  • When you send an email how many computers does it go to
    12·1 answer
  • The purpose of a database is to help people stop using spreadsheets.
    10·1 answer
  • (TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
    12·1 answer
  • What features are needed in a mobile to make it a business solution?
    13·1 answer
  • What are some best practices for file management
    8·1 answer
  • You used a website to learn about the child-rearing practices in China. Your study is related most to which aspect
    13·2 answers
  • What is the database and presentation for files​
    14·2 answers
  • allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!