1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
12

One of the jobs of the webmaster are to create a websitetrue or false

Computers and Technology
2 answers:
Talja [164]3 years ago
8 0

true is the correct answer

nata0808 [166]3 years ago
7 0
The correct answer is true
You might be interested in
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
tatuchka [14]

Answer:

An HTTP Header attack

Explanation:

In web applications an HTTP refers to Hypertext Transfer Protocol and an HTTP Header is the value that is displayed in  a request or response message, the header has a name and a value separated by a colon.

An HTTP header attack called an header injection is a vulnerability that is present when users' inputs are required for the dynamic generation of HTTP headers. This vulneraility allows several security threats to be carried out, some examples are:

  1. Malicious site redirection
  2. Cross-site scripting, and
  3. Session fixation through the set-cookie header
8 0
3 years ago
The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
drek231 [11]

Answer

Cyber Security professionals

Explanation

Cyber security professionals can help the company protect itself from hackers. They are experts who will install antivirus into the software used in the company to protect virus manipulation and prevent malware. They will further encrypt the websites of the company and reset the password of the computers into two-factor authentications to make the login requirements advanced.


7 0
3 years ago
Read 2 more answers
What is the decimal representation of the following signed binary numbers?
zheka24 [161]

Answer:

(10000000)₂ = -128 in decimal

(11001100)₂ = -52 in decimal

(10110111)₂ = -73 in decimal

Explanation:

<u>NOTE:</u> If Most Significant Bit is 0, it is positive number and if MSB is 1, it is negative number. If number is positive we can simply convert it to decimal. But if number is negative, follow following formula:

  • (complement of the number) +1

<u>EXAMPLE 1</u>

  (10000000)₂

  (01 1 1 1 1 1 1)₂   ↔  complement of the number

<u>+                    1</u>

  (10000000)₂ = 1 ×2^{7}= 128 (magnitude in decimal)

But we remember MSB was 1 so answer is -128.

<u>EXAMPLE 2</u>

  (1 1 0 0 1 1 00)₂

  (0 0 1 1 0 0 1 1)₂

<u>+                       1  </u>

  (0 0 1 1 0 1 0 0)₂ = 52 (magnitude in decimal)

But we remember MSB was 1 so answer is -52.

<u>EXAMPLE 3</u>

  (1 0 1 1 0 1 1 1)₂

  (0 1 00 1 000)₂

<u>+                      1  </u>

  (01 00 1 00 1‬)₂ = 73 (magnitude in decimal)

But we remember MSB was 1 so answer is -73.

5 0
3 years ago
What is the purpose of the Occupational Safety and Health Act?
NikAS [45]

Answer:

The purpose of this act was to reduce workplace hazards and implement more safety and health programs for both employers and their employees.  

3 0
3 years ago
Read 2 more answers
If you wanted to find out whether an integer contained an even number of 1 bits, which status flag would be useful
AleksandrR [38]

Answer:

The correct answer will be "Parity".

Explanation:

  • Parity seems to be a methodology that tests when information is transferred or missing or overwritten when something is transferred between one storage location to another, and then it is communicated between processors or devices.
  • It would be used whilst also contrasting the container as well as the aggregated parity to evaluate or dual inspect for inaccuracies.
8 0
3 years ago
Other questions:
  • It's time for you to schedule a dental checkup. The responsible thing to do is to ___
    11·1 answer
  • Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above,
    5·1 answer
  • Operational feasibility, which refers to user acceptance and support, as well as management acceptance and support, is also know
    9·1 answer
  • Which of the following is software? : Monitor Mouse Windows Keyboard Printer
    13·1 answer
  • A byte is made up of 8 bits (binary digits). You have a programming language that uses one byte to represent characters and are
    5·1 answer
  • To gain a competitive edge this year, the upper management of a global IT company has decided to focus on customer service, empl
    13·1 answer
  • What time is it NOW??
    11·2 answers
  • Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program shou
    11·1 answer
  • How to execute python code in command prompt *window*?
    5·1 answer
  • ____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!