1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
15

Why is local hosting not suitable for a public website?

Computers and Technology
1 answer:
ruslelena [56]3 years ago
8 0

Answer:

Because its only available to the host

Explanation:

You might be interested in
Need help with my cs110​
lord [1]
Yes so the it’s C 283 cause I think yes can
7 0
3 years ago
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
Vlad [161]

Answer:

Install in Safe Mode

Explanation:

If a system is corrupted with malware, installing an antivirus or anti-malware might not be possible. The malware can hide in a system and it can prevent the anti malware software from installing or scanning on the system.

Running your system in safe mode and install is the best option. Safe mode blocks third party programs and hardware drivers. A malware should not start when a system is in safe mode, therefore you can install the anti-malware and scan to remove all the malware from your system.

5 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Magnetic field strength in an ignition coil is measured in what units?
kolbaska11 [484]
If you meant hertz in d then yes d would be correct
. <span />
3 0
3 years ago
Read 2 more answers
Allison needs to graph the yearly average snowfall in Alaska. She should use a:
bazaltina [42]

C: bar graph

bar graphs are used to track changes over time, so I would say that C is your best bet

7 0
4 years ago
Read 2 more answers
Other questions:
  • Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels.
    9·1 answer
  • When you choose the ____ compression setting, photos are compressed to the resolution specified on the advanced tab in the power
    13·2 answers
  • E-mail is an temporary message medium.<br> a. True<br> b. False
    5·2 answers
  • Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a
    6·2 answers
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • What does t'challa actions reveal about his character( black panther movie)​
    6·1 answer
  • Please help meh T^T Which of the following describes an application error? Select 2 options.
    5·2 answers
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    14·1 answer
  • which search engine technology prevents a website from appearing in numerous top positions in the search engine result pages?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!