1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
9

There are several methods of updating information and data on a webserver. We must consider who performs those updates upfront w

hen we design the website. Research three methods for updating webserver data.
Computers and Technology
2 answers:
Thepotemich [5.8K]3 years ago
5 0

Answer:

RTMC pro, HTML server-sent and Java Software Development Kit

Explanation:

<u>RTMC pro</u>:  The setup of RTMC pro is done automatically and there is provision of several elements to upload and store data on the server using screens. Screens are usually saved as files and then integrated to an internal or external server.

<u>HTML server-sent</u> : This is a way for webpages to communicate with the webserver. In this method, for ever HTML page there is an associated script present on the server side that will continuously provide realtime data update. This scrip will have to be configured with the data you want to update.

<u>Java Software Development Kit</u> : JAVA SDK is used to build software/applications on Java. This permits programmers to develop applications or applets to perform data updating on the servers. The developped applets can be used with internal servers as well as third party servers.

sergejj [24]3 years ago
5 0

Answer:

RTMC pro, HTML server-sent and Java Software Development Kit

Explanation:

You might be interested in
People must use Telepresence when Virtually meeting with a group of coworkers true or false
Norma-Jean [14]
I believe the answer is false
7 0
4 years ago
________ is a suite of protocols designed to connect sites securely using ip networks.
a_sh-v [17]
IPSec


Hope that helps, Good luck!! (:
7 0
3 years ago
Read 2 more answers
A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
Anuta_ua [19.1K]

The safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

<h3>What is encryption?</h3>

The process to convert data into a coded message that conceals its real meaning is known as encryption.

As we know,

Key escrow is the security measure that makes it possible for a reliable third party to own a copy of the encryption key.

Electronic cash systems employ encrypting to secure traditional transaction information like account information and activity amounts.

Thus, the safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

Learn more about encryption here:

brainly.com/question/17017885

#SPJ4

7 0
2 years ago
Air bags expand at up to __________ mph. A. 70 B. 100 C. 150 D. 200
almond37 [142]
Airbags expand
D. 200 mph
7 0
3 years ago
What does it mean if you tell a judge you are “taking the fifth”?
ziro4ka [17]
The fifth amendment states that “no person shall be compelled in any criminal case to be a witness against himself.”
5 0
4 years ago
Other questions:
  • ​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
    7·1 answer
  • Technology not only influences what formats are possible in media, it also defines their contents.
    13·1 answer
  • Types of relationships include aggregation, composition, link, generalization, and specialization 9. TRUE FALSE
    9·1 answer
  • Which of the following gestures would you use if you want to activate a link on your new tablet?
    12·1 answer
  • What type of data is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter
    13·1 answer
  • How to create diagram that demonstrates the step<br> by step procedures in performing a mail merge.
    12·1 answer
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • Random.choice will choose a number between 1 and 100. True False​
    6·1 answer
  • In the world of computer languages, whats the most popular language?
    13·1 answer
  • A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!