1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
6

What types of roles are there as a webmaster?

Computers and Technology
2 answers:
tiny-mole [99]3 years ago
8 0
<span>HOSTING AND SERVER MAINTENANCE
</span>WEBSITE MAINTENANCE<span>TROUBLESHOOTING
</span><span>PROGRAMMING
</span><span>SEARCH ENGINE OPTIMIZATION
</span><span>WEB DESIGN</span>
Nuetrik [128]3 years ago
6 0
<span> PHP, ASP, and Javascript. They handle the technical aspects </span>
You might be interested in
A man-in-the-middle attack or impersonation are likely to result in problems with
Ivan

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

6 0
3 years ago
The ________ view in access looks similar to an excel spreadsheet.
ch4aika [34]
Datasheet 
<span>The datasheet view in access looks similar to an excel spreadsheet.</span>
6 0
3 years ago
In 1839, Talbot released the paper-based process which he called _ to the public.
vlabodo [156]

Answer:

I'm pretty sure it's photogenic drawing.

7 0
2 years ago
In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
emmainna [20.7K]

This idea is most closely related to the Layering in terms of how to reduce complexity.

<h3>Describe cybersecurity?</h3>

The term "cybersecurity" refers to the safeguarding of computer systems and networks against the leakage, theft, or destruction of data as well as the interruption of the services they offer.

Defense in depth is a technique used in cybersecurity that is one of the greatest ways to safeguard a computer or network. If one fails, it's likely that another will identify the issue. The approach to simplifying that is most in line with is called layering.

Thus, This idea is most closely related to the Layering in terms

For further details about cybersecurity, click here:

brainly.com/question/13016321

#SPJ1

5 0
2 years ago
Read 2 more answers
PLEASE HELP ASAP!!!!!!!!!!!
Bingel [31]

Answer:

True

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • A directional antenna issues wireless signals along a(n) ____ direction.
    9·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • True or False?
    8·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Count input length without spaces, periods, or commas Given a line of text as input, output the number of characters excluding s
    8·2 answers
  • What is the difference between a software engineer and a system analyst?
    8·1 answer
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • Does digital media play a big role in your life?
    13·1 answer
  • which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
    11·1 answer
  • Lesson 2.7 Code Practice #2
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!