1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
11

jeff wants to create a website with interactive and dynamic content. Which programming language will he use?

Computers and Technology
2 answers:
Alex73 [517]3 years ago
8 0

Answer:

Jeff can use programming languages like JavaScript, python, PHP, Java etc.

Explanation:

Creating a web site involve using both front-end language and back-end languages.

The front end language is use to design how the website looks. The front-end works on the appearance and the user interface. Programming languages that are basically front end language are HTML, CSS and JavaScript.

Server side or back-end languages can be use to add interactivity and also make your website dynamic. Dynamic website present real time interaction with the user.  Dynamic website changes base on the behavior and preference of the user. The programming languages one can use to create dynamic content and interactive contents are python, Java, JavaScript , Php etc

umka21 [38]3 years ago
4 0

Answer:

Html for creating the base of the website

Css to design the website

Javascript for custom interactions and functions

Explanation:

You might be interested in
What does <3 mean at the end of a message?
adelina 88 [10]
It is supposed to symbolize a heart, signifying love.
8 0
3 years ago
Before a program written in c can be executed on a computer, what step is required to be done first?
sergejj [24]
It should be compiled. It won't work if it's not compiled.
6 0
3 years ago
The purchase and subsequent sale of a securities position in a customer account solely to generate commissions is____________.
Citrus2011 [14]

Answer:

Churning

Explanation:

Churning is termed as an act of a broker conducting immoderate trading in the account of client solely to generate commissions. It is an illegal and deceptive practice. It violates security laws. The purchase and subsequent sale of a securities that are little or insignificant to meet the investment goals of client can be the evidence of churning. Consequently it causes considerable losses in client's account or can produce a tax liability.

Churning occurs due to over trading by a broker to generate commissions by buying and selling stocks excessively on the behalf of investor. This often happens when broker has permissive authority over client's account.

5 0
3 years ago
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
3 years ago
I NEED HELP SOMEONE HELP ME PLEASE
kirill115 [55]
1. non photorealistic rendering
2. siftables
3. spherical audio
4. blu ray
7 0
2 years ago
Other questions:
  • What are two fundamental components of data structures?
    10·1 answer
  • What is after Windows 8.1
    11·2 answers
  • What date of us can be used on a desktop computer
    12·1 answer
  • The first numerical control machine tool was demonstrated in 1952 in the United States at the Massachusetts Institute of Technol
    14·1 answer
  • What will you see on the next line?
    6·2 answers
  • When calling a function with arguments that should be modified, the __________ of those arguments are passed.
    5·1 answer
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • In which program structure does the processor verify the mentioned condition only after executing the dependent statements once?
    8·2 answers
  • Draw
    7·1 answer
  • How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!