1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
9

There are several methods of updating information and data on a webserver. We must consider who performs those updates upfront w

hen we design the website. Research three methods for updating webserver data.
Computers and Technology
2 answers:
Thepotemich [5.8K]3 years ago
5 0

Answer:

RTMC pro, HTML server-sent and Java Software Development Kit

Explanation:

<u>RTMC pro</u>:  The setup of RTMC pro is done automatically and there is provision of several elements to upload and store data on the server using screens. Screens are usually saved as files and then integrated to an internal or external server.

<u>HTML server-sent</u> : This is a way for webpages to communicate with the webserver. In this method, for ever HTML page there is an associated script present on the server side that will continuously provide realtime data update. This scrip will have to be configured with the data you want to update.

<u>Java Software Development Kit</u> : JAVA SDK is used to build software/applications on Java. This permits programmers to develop applications or applets to perform data updating on the servers. The developped applets can be used with internal servers as well as third party servers.

sergejj [24]3 years ago
5 0

Answer:

RTMC pro, HTML server-sent and Java Software Development Kit

Explanation:

You might be interested in
Which of the following statements is true regarding how Wireshark works? a. Where packets are captured and how they are captured
I am Lyosha [343]

Answer:

b. By running the Wireshark software on the same computer that generates the packets, the capture is specific to that machine.

Explanation:

By running the Wireshark software on the same computer that generates the packets, the capture is specific to that machine. is true regarding how Wireshark works.

4 0
3 years ago
The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument t
Novosadov [1.4K]

Answer:

bc

Explanation:

5 0
3 years ago
Explain how the CPU processes data instructions
zepelin [54]

Answer: The working of the CPU is defined as a three-step process. First, an instruction is fetched from memory. Second, the instruction is decoded and the processor figures out what it's being told to do. Third, the instruction is executed and an operation is performed.

Explanation: Hope this helps

6 0
3 years ago
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because
NikAS [45]

Answer:

The answer is "True".

Explanation:

Traditional techniques of application development were focused on pre-development stages. These control system flows through claims to design and upgrades and will then tests and repair are directional there.

  • It enables the user to create and run a machine-based data system.  
  • It uses program and device, that specifically the solutions, that enable manual information to be processed.
6 0
4 years ago
One of the most toxic components of a computer is the _________.a. plastic in the keyboardb. silicon in the glass of the compute
Burka [1]

Answer:

C. Lead embedded in the glass of the monitor.

Explanation:

Cathode Ray Tube (CRT) monitors have lead embedded in their glass. Exposure to small quantities of lead can lead to lead poisoning. There are about 2.2 kilograms of lead in a big CRT monitor.

This amount of lead is mixed with the glass to improve the optical quality and to stop radiation from affecting the user.

Exposure to lead can cause the following:

  1. Constipation.
  2. Irritability,
  3. Headaches
  4. Aggressive behavior and so much more.
3 0
4 years ago
Read 2 more answers
Other questions:
  • ​ Search engines can perform date-filtered searches because, when web servers send a webpage to a ____, they include a header th
    11·1 answer
  • Is it true or false for this question?
    8·1 answer
  • Why was unicode invented
    12·2 answers
  • An _____image is an image that appears on a web page
    8·1 answer
  • The _______ system coordinates computer resources, provides the user interface, and runs applications.
    10·1 answer
  • You create a formula in A8 that adds up the numbers listed in A1 through A7. You copy the formula and paste it into C8. What hap
    9·1 answer
  • the penalties for ignoring the requirements for protecting classified information when using social networking services are ____
    12·1 answer
  • Susan uploads her newly created files on the web server using FTP. What should she ensure while uploading to prevent other users
    9·2 answers
  • Can you help me with these AP Computer Science Questions. (THIS IS DUE BY 1:30 PM today) you have to evaluate the Boolean Expres
    10·1 answer
  • Qwertyuytrefgvbhnjkmjhgfvbnmjkuhytgfvbnmjkuyhgnjmkiuyhgbnmkloi<br><br> type pig latin now . . .
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!