1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
13

I need help!!!!

Computers and Technology
2 answers:
mote1985 [20]3 years ago
7 0

Answer:

d. log on to the website host control panel

Explanation:

The first step necessary to begin setting up a Website is to log on to the Website host control panel.  Technically, you could in many cases begin by uploading your files through FTP without the need to access the control panel, but the question asks about setting up a Website, that involves more than just uploading the files.

The other answers are good too, but not the first step to do:

a. select a domain name : Normally, that would have been done before, as you opened your account with the host, you would define the domain name <u>before paying</u>.  Since the question says you already paid, the domain must have been selected already.

b. configure email addresses : This is done through the control panel... so you have to go to the control panel first.

c. upload website files to the host directory : Although the files could be uploaded by FTP, which could be done without ever accessing the control panel,  the way most users will do it is through the control panel.  Also, you'll need to go to the control panel to configure the FTP accounts, since that is not always done for you.

olga_2 [115]3 years ago
3 0

Answer:

d. log on to the website host control panel

Explanation:

    The hosting service is the one who will put your website up and running.

    There are many options on the market for this purpose, both free and paid. However, the big problem with choosing a free hosting service is that they have many restrictions and can be unstable, which can cause your site to go down.

    Once you have your domain and a good hosting service, the next step is to build your website.

    Once again, there are several options for you, including the website builders themselves from the contracted hosting services.

    To decide which one is best, see if you can customize the site, choose a template related to your business, and include videos and images to make the pages your identity.

    The good thing about these builders is that most of them are pretty self explanatory, so it is easy to create a website with the help of these tools.

     But if you have no way to invest any upfront capital in setting up your website, there is another way to do this, which is through free website builders that already include the hosting service.

You might be interested in
What is an important fact about databases?
Kitty [74]

They hold a lot of data and if they are tampered with, they can be ddossed

5 0
3 years ago
Which is the last step in conducting a url research
tino4ka555 [31]
<span> The user's browser renders the html code as a visual web page. I think. Let me know if I git it wrong! :P</span>
6 0
4 years ago
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
I NEED HELP ASAP:
Tresset [83]

Answer:

64

Explanation:

A truth table can be defined as a table that tells us more about a Boolean function.

A truth tables also gives us more information about how logic gates behave. They also show us the relationships between the inputs and outputs of a logic gates.

Logic gates are essential and fundamental components of an electrical circuit.

The rows on a truth table shows us the possible combinations of the inputs of a circuits as well as it's resulting or corresponding outputs.

In order to determine the number of rows that a truth table has, the formula below is used.

Number of rows in a truth table = (Number of Inputs)²

In the question above, we are told that

A truth table has 8 inputs and 5 logic gates. The number of rows needed for this truth table is calculated as:

Number of rows in a truth table = (Number of Inputs)²

Number of rows in a truth table = (8)²

= 64 rows.

5 0
3 years ago
Show the printout of the following code.
alexira [117]

Answer:

E. 7.0

Explanation:

the 7 of the out of the older and make a shame of waves and force of trying

7 0
3 years ago
Other questions:
  • Assume you're using a three button mouse. to access shortcut menus you would
    10·1 answer
  • What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
    11·1 answer
  • Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
    12·1 answer
  • You want to average the numbers in the range b1:b30. you have named this range of cells data and wish to use this range name in
    9·1 answer
  • which is a set of techniques that use descriptive data and forecasts to identify the decisions most likely to result in the best
    8·1 answer
  • The information that’s displayed in a datalist control is defined by _____.
    10·1 answer
  • URGENT!!!
    9·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Brian is a computer engineer who writes security software for a banking system. The
    13·1 answer
  • How to execute python code in command prompt *window*?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!