1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
10

Which of the following can be used to determine how much traffic a website is getting?

Computers and Technology
1 answer:
zysi [14]3 years ago
4 0
Web analytics
The number of visitors
The average number of page views per visitor
Average visit duration
Average page duration
Domain classes
Busy times
Most requested pages
Most requested entry pages
Most requested exit pages
Top paths
Referrers; The host
You might be interested in
The default ____ for a hyperlink is the folder location and the name of the file to which you will link.
ycow [4]
Title is used
hope it helps
6 0
4 years ago
You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
Bess [88]

Answer:

Nmap CST CO CT0

Explanation:

Network map (Nmap) is a network scanning and host detection tool used in penetration testing to sorting out vulnerability in a network. Nmap APIs are used in packet sniffer tools as well to scan for available networks. There are different nmap command , but the command needed to scan a port with less noise to evade an IDS is the nmap's "Nmap CST CO CT0" command.

5 0
4 years ago
Technology trends continue to increase the processing capabilities of mobile devices. The latest smartphones include up to 8 pro
baherus [9]

Answer:

Two circumstances under which it might be beneficial to offload application functionality from a powerful smartphone are Data Saving and Ransomware/Malware Protection.

Explanation:

Various data like documents, videos,photos etc can be offloaded to a cloud or cloud-let in order to prevent permanent data loss during inevitable as loss of phone, theft etc.  Such saved data can be easily retrieved from cloud storage when new phones are gotten without any loss. Also, in order to prevent total data and application loss by various various attacks, it is advisable that one stores various application and data on cloud servers to enable retrieval easily. Even some cloud servers offer backup security against such virus attacks.

6 0
3 years ago
How is all data stored on a computer?
Maru [420]

Answer:

All data in a computer is stored as a number. Binary data is primarily stored on the hard disk drive (HDD). The device is made up of a spinning disk (or disks) with magnetic coatings and heads that can both read and write information in the form of magnetic patterns.

Explanation:

Please mark me as brainilest if you don't mind and have a wonderful day!! :D

4 0
3 years ago
Read 2 more answers
How would I do this code with a while loop to remove the letters? Please and thank you
dusya [7]

There is of course a replace() function in java that lets you do this without a while loop. If you want to do it letter by letter, it gets a little complicated because you have to take care not to index the string outside its bounds.

I did not bother to create a separate runner class. The Main is just inside this class and everything is static.

public class LetterRemover {

   public static String RemoveLetters(String s, char c)

   {

       int loc = s.indexOf(c);

       while(loc >= 0)

       {            

           if (loc == 0) {

               s = s.substring(1);

           } else if (loc == s.length()-1) {

               s = s.substring(0, loc);

           } else {

               s = s.substring(0, loc) + s.substring(loc+1);

           }

           loc = s.indexOf(c);

       }

       return s;

   }

   public static void Test(String s, char c) {

       System.out.format("%s - letter to remove %c\n%s\n", s, c, RemoveLetters(s,c));

   }

   

   public static void main(String[] args) {

       Test("I am Sam I am", 'a');

       Test("ssssssssxssssesssssesss", 's');

       Test("qwertyqwertyqwerty", 'a');

   }

}

7 0
3 years ago
Other questions:
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • TWO MINUTES LEFT<br> ________ __________ is the physical arrangement of devices on a network.
    9·1 answer
  • If your hood suddenly flies up you should turn on your hazard lights and continue driving. True or false?
    10·2 answers
  • If you change the text to bold,you are changing the what?
    9·1 answer
  • What is MS Paint ?<br>Computer <br>short answer​
    14·2 answers
  • Someone knows a good compiler for iPad? It has to be an app
    10·1 answer
  • A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following would represent
    9·1 answer
  • Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
    5·1 answer
  • Subratract 11100 from 1011 by using 1's complement method step by step​
    6·1 answer
  • Which of the following statements is false? A. The internet has developed at a consistent rate throughout the world. B. There ar
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!