Answer:
d. integrity
Explanation:
Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.
Answer:
C. layout of each page with its respective elements
Explanation:
A layout of each page with its respective elements will give the client a good idea of the final product and help him confirm his desires/requests towards the creation of the Web site. Most people are visual, especially about things they don't fully understand, so a clear and visual representation is best.
<u>A. Bulleted lists and titles</u>... won't give the idea of the full layout of the Web site.
<u>B. chart depicting</u>.... that's more a tool for the programmer than the client, although user flow is important, it isn't as much as the visual aspect of each page.
<u>D. pictures and screenshots of websites of other florists..</u>. That could be a useful aid on the first contact, but the question implied the Web site is already in progress... so that wouldn't help much.
<u>E. programming code for the website</u>, absolutely not, the client hired Jeremy not to have to deal with that.
Answer:
yes administrators have to be concerned
Explanation:
It is necessary for countermeasures to be taken against DoS attacks
The types of attacks that can still occur are:
If the network connection get to be overloaded, there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.
To reduce the impact of this kind of attacks,
1. there should be enough or excess network bandwidth and distributed servers should be replicated if there is a possibility that network could get to be overloaded.
2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.
3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters
4. Use strong antivirus on computer sytems that are used to connect to the internet
difference between engineering and architecture are.
A engineer is a person whose job involves designing and building engines, machines, roads, bridges ,etc .
While architect design buildings only.
Answer:
A: shift in user's role from the passive consumer of content to its creator
Explanation:
During the phase of Web 2.0, consumers evolved from just been highly informed and socially connected (in other words, they evolved from being just passive consumers) to a more engaged and empowered consumer. This implied that consumers could easily adapt to new technologies to meet individual needs and create an emotional bond with brands. They evolved from passive consumers to being the creators of what they wanted to meet their specific needs.