1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
10

Which functions are performed by server-side code??​

Computers and Technology
1 answer:
umka21 [38]3 years ago
4 0

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

You might be interested in
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
3 years ago
Major innovation made from establishment of abacus to the development of fifth dev of computer generation
expeople1 [14]

<u>Explanation</u>:

The establishment of the Abacus brought about one of the first counting device (calculator). This device was a mechanized computer that supported numeric calculations. However<u>, the process was entirely manual and mechanized. </u>This innovation led to;

First-generation  of computers, although not entirely manually operated like Abacus, made use of vacuum tubes, were very big in size and could store only a small amount of information.

Second Generation of computers unlike the first generation that uses vacuum tubes, this one came with new technology; the use of transistors. The computers were smaller in size than vacuum tubes.

Third Generation  computers made use of IC (Integrated circuits) for the first time. Contained higher storage capacity and was more reliable than previous generations.

Fourth Generation computers became known as the personal computer generation. This generation brought the use of personal computers on a personal level as they use microprocessors, was easy to carry about, had larger storage capacity and faster speed of operations.

Fifth-generation of computers is known as the age of artificial intelligence. These computers were programmed with the ability to make decisions just like a human being would.

7 0
3 years ago
Explain the limitations of the old economy<br>​
pickupchik [31]

Explanation:

Time Constraint and Time Consuming: Nobody would carry out business when the market was closed. ... Limited Space: The old economy depended on physical space such as market places and offices before business transaction could take place.

7 0
3 years ago
1. What do you think of the use of Moore’s Law to hypothesize a timeframe for the origin of life?
KATRIN_1 [288]

Answer:

Moore's Law refers to Moore's perception that the number of transistors on a microchip doubles every two years, though the cost of computers is halved. Moore's Law states that we can expect the speed and capability of our computers to increase every couple of years, and we will pay less for them. Another tenet of Moore's Law asserts that this growth is exponential.

5 0
3 years ago
Read 2 more answers
Write a statement that takes a variable named open_file that contains a file object and reads the next 12 characters into a vari
velikii [3]

Answer:

description=open_file.read(12)

Explanation:

A programming language in computer is a set formal languages that comprises a set of instruction which produce various kinds of output. It is used ti implement algorithms in computer programming.

In the context,  description=open_file.read(12) is the statement given to the computer as input which takes a variable named as open_file containing a file object and which reads the next 12 characters into the variable named as description.

6 0
2 years ago
Other questions:
  • How to open CD port in PC lenovo ideapad 330​
    14·1 answer
  • A blue line, called a ____ line, that appears when you are dragging a GUI object on a Windows Form object indicates that the obj
    10·1 answer
  • What component of Kerberos is responsible for storing keys for encrypting and decrypting data in the authentication process?
    13·1 answer
  • How does culture affect your life
    15·1 answer
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
    9·2 answers
  • I need to know everything about lg fortune network unlocking or sim network unlock pin. Where, How, Which is best solution to do
    10·1 answer
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
  • How each programming language differs in terms of constructs, techniques, use and requirements?
    9·1 answer
  • What is the definition of Graphic AIDS?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!