1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
12

Briefly explain what are JavaScript librairies​

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

Explanation:

In the spirit of clear definitions:

JavaScript is a scripting language used by front end developers (people who build parts of a website or web app that users see on their screen) to implement and manage dynamic content. There are other scripting languages out there, including Python, but JS is the most commonly used.

Therefore, JavaScript libraries are collections of pre-written code snippets that can be used (and reused) to perform common JavaScript functions.

You might be interested in
Plz help me for this !!!!!!!!!!!
harina [27]

Answer:

what do u need help with??

8 0
3 years ago
Name 3 supercomputers along with their cost, purpose and the country it is located.​
Alika [10]

Answer:

The three super computers are

a) Fujitsu Fugak

b) IBM Summit/IBM/Nvidia/Mellanox

c) Sunway TaihuLigh

Explanation:

Three super computers are as follows

a) Fujitsu Fugak - It is located in Kobe, Japan and its costs is ¥130 billion

b) IBM Summit/IBM/Nvidia/Mellanox - It is located in Oak Ridge, U.S. and it costs $325 million

c) Sunway TaihuLigh- It is located in Wuxi, China and it costs US$273 million

5 0
3 years ago
What were the first printed media items that graphic designers created?
laila [671]

Answer:

books

Explanation:

4 0
3 years ago
The act of deliberately accessing computer systems and networks without authorization is generally known as _____.
Anuta_ua [19.1K]

it is known as hacking

3 0
2 years ago
You need to reduce the number of unplanned rollbacks of erroneous production deployments in your company's web hosting platform.
Lelu [443]

Answer:

1. Introduce a blue-green deployment module

2. Fragment the monolithic platform into micro services.

Explanation:

1. Blue-green deployment is a type of  technique which minimizes downtime and risk by running two identical production environments called Blue and Green.

This technique eliminates downtime due to app deployment. In addition, blue-green deployment reduces risk: if something unexpected happens with your new version on Green, you can immediately roll back to the last version by switching back to Blue.

2. The scenario behind microservices architecture is that some types of applications become easier to build and maintain when they are broken down into smaller, composable pieces which work together. Meaning that each component is developed separately, and the application is simply the sum of its constituent components.

Each service runs a unique process and usually manages its own database  in a micro services architecture,. This provides development teams with a more decentralized approach to building software,ans also allows each service to be deployed, rebuilt, redeployed and managed independently.

Micro services do have a few disadvantages when compared to monoliths:

   Micro services, unlike the internals of a monolith,  communicate over a network. In some situations, this can be seen as a security concern. Istio solves this problem by automatically encrypting the traffic between microservices.

    Achieving the same level of performance as with a monolithic approach can be difficult because of latencies between services.

 

3 0
3 years ago
Other questions:
  • Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on t
    13·1 answer
  • What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
    10·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Please Help!! Digital Information Technology Class!!
    12·2 answers
  • Area on a computer screen where<br> you perform work
    6·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
    12·1 answer
  • The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predica
    5·1 answer
  • The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!