1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
13

I need help!!!!

Computers and Technology
2 answers:
mote1985 [20]3 years ago
7 0

Answer:

d. log on to the website host control panel

Explanation:

The first step necessary to begin setting up a Website is to log on to the Website host control panel.  Technically, you could in many cases begin by uploading your files through FTP without the need to access the control panel, but the question asks about setting up a Website, that involves more than just uploading the files.

The other answers are good too, but not the first step to do:

a. select a domain name : Normally, that would have been done before, as you opened your account with the host, you would define the domain name <u>before paying</u>.  Since the question says you already paid, the domain must have been selected already.

b. configure email addresses : This is done through the control panel... so you have to go to the control panel first.

c. upload website files to the host directory : Although the files could be uploaded by FTP, which could be done without ever accessing the control panel,  the way most users will do it is through the control panel.  Also, you'll need to go to the control panel to configure the FTP accounts, since that is not always done for you.

olga_2 [115]3 years ago
3 0

Answer:

d. log on to the website host control panel

Explanation:

    The hosting service is the one who will put your website up and running.

    There are many options on the market for this purpose, both free and paid. However, the big problem with choosing a free hosting service is that they have many restrictions and can be unstable, which can cause your site to go down.

    Once you have your domain and a good hosting service, the next step is to build your website.

    Once again, there are several options for you, including the website builders themselves from the contracted hosting services.

    To decide which one is best, see if you can customize the site, choose a template related to your business, and include videos and images to make the pages your identity.

    The good thing about these builders is that most of them are pretty self explanatory, so it is easy to create a website with the help of these tools.

     But if you have no way to invest any upfront capital in setting up your website, there is another way to do this, which is through free website builders that already include the hosting service.

You might be interested in
Traceability of requirements is helpful in the followingexcept
larisa86 [58]

Answer: D)  Identifying GUI's for a particular requirement

Explanation:

 Traceability of requirements is helpful except identifying GUI's for a particular requirements as, traceability in project management describe the relationships between two or more element throughout in the development process and outline the relationship between the customer requirement by traceability matrix. And the requirement of traceability is so important because it creating a downstream flow of software and test cases in software requirement but not helpful in GUI identification.

6 0
3 years ago
Can someone answer me
Alexxandr [17]

Answer:

D. 5,184,000

Explanation:

3000*1728= 5184000

8 0
3 years ago
Who was the first person in 1983 to offer a definition of the term computer virus
Simora [160]

Answer:

Fred Cohen

Explanation:

3 0
3 years ago
Read 2 more answers
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • A public Wi-Fi risk that can be minimized by only visiting
    5·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
    11·1 answer
  • Satellite images are based on data obtained by ____________ (gps/landsat) satellites.
    5·1 answer
  • How do I type over Images (photo posted ​
    12·2 answers
  • Were can i watch unexpected free season 3
    9·1 answer
  • How many questions do you have to answer before you can use direct messages on Brainly?
    13·2 answers
  • How can we avoid falling victim to a phishing or pharming scheme
    14·1 answer
  • The range of an area where users can access the Internet via high-frequency radio signals transmitting an Internet signal from a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!