1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
14

You have been doing a lot of web surfing lately as part of your research for your course and along the way you have noticed a gr

owing number of active server pages. You have a good head for technical details and ask your friend Laura to enlighten you about some of the finer points of ASP technology.
Which of the following does Laura tell you is NOT a component of the active server page?
a. the generated code component that executes on the web server
b. the HTML component that is interpreted and executed by a web browser
c. the database engine that generates the form
d. All of the above are components of the active server page.
Computers and Technology
1 answer:
creativ13 [48]3 years ago
3 0

The generated code component that executes on the web server is the following does Laura tell you is NOT a component of the active server page.

a. the generated code component that executes on the web server

<u>Explanation:</u>

Asp technology is where it is a combination of both  HTML and visual basic programming. Asp web pages are executed in server and display as Html to the end-users.

With the HTML coding, only static pages can be developed whereas through ASP web pages are developed and which contains visual basic coding languages and for client-side validates in ASP web pages either javascript or visual basic scripts are used.

Each ASP web pages are compiled at the server end and executed and complied out HTML pages are shown in web pages.

We need to install the ASP component at the server to execute the ASP web pages.

You might be interested in
Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
dusya [7]

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

3 0
3 years ago
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data
blagie [28]

Answer:

C.<em> improve data quality and reduce redundancies, reduce increased and staggering storage management costs</em>

<em></em>

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

6 0
3 years ago
____ convert a program design developed by a systems analyst or software developer using one of many computer languages.
erica [24]

Answer:

"Programmer " is the correct answer for the following question.

Explanation:

A programmer is a person who created the software They are basically a coder who develop a code for the program or the software. They are specialists in some in the programming code area. The programmer are writing the program for a different kind of software.

The main objective programmer they convert the program design which is developed  by a systems analyst or system designer using a different kind of computer language  

4 0
3 years ago
Other questions:
  • What is the other name of the horizontal column graph?
    6·2 answers
  • Why is it important to know much time you spend on task
    8·1 answer
  • rob just got a new idea for the movie he's making, and he wants to put in late hours to get it done. Which of the following stat
    10·1 answer
  • Which protocols are TCP/IP application layer protocols? (choose all that apply)
    5·2 answers
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • Write programs in python to display “Valid Voter”. (condition : age of person should be
    15·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!