1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
13

When you create names for the elements of a webpage (such as ), what are some rules that you can follow to make your HTML code e

asier to understand and simpler to use?
Please help!!
Computers and Technology
2 answers:
shusha [124]3 years ago
6 0

Answer:

by using proper indentation

Explanation:

yan [13]3 years ago
4 0

By using the proper indentation and punctuation

You might be interested in
Write short note on points to consider while using attributes with the tags.​
ASHA 777 [7]

Answer:

Explanation:

Tags are used to display the content but what about the specifics of that content like if a lik should open ina window or the location of an image .Attributes are used to specify things like this regarding the content on your webpages.Attributes are located within tags.Attributes are located in start tag only,not in end tags.

7 0
3 years ago
DNS forwarding can be set up so that if the DNS server that receives the forwarded request cannot resolve the name, then the ser
hoa [83]

Answer:

Nonexclusive forwarding

Explanation:

In Nonexclusive forwarding, DNS forwarding is setup so that if the DNS server receiving the forwarded request cannot resolve the name, then the server that originally forwarded the request makes an attempt to resolves it. If that fails, the server sends a request to its designated forwarder.

8 0
3 years ago
Which outcome would be a good use for the SUM function? Check all that apply.
Stolb23 [73]

Answer:

The answers are 1,2,5,and 6.

Explanation:

5 0
3 years ago
5. Many large organizations have had their database system hacked and customer data stolen. How should the security for the data
yawa3891 [41]

Answer:

Security is very crucial for any system. Vulnerability can be exposed on different levels which includes database breach, network level attacks and application level attacks. Different kinds of attacks can be carried out for different components. Attacks carried out on databases are different from other kinds of attacks.  

Attacks on databases can be because of any of the following exposed vulnerability.  

  • Poor system design and weak architecture
  • Incorrect configurations  
  • SQL injection attacks  
  • Weak Authentication
  • Brute Force attacks on user credentials
  • Improper privilege mechanisms  
  • Privilege abuse and excessive access.  
  • Poor design and flaws in programming
  • Data loss and information corruption

Security of database systems should be designed by considering best database security design practices. Network security will ensures that all the networks level attacks are detected and mitigated which includes DDOS attacks, Syn flood attacks, Session Attacks, DOS attacks and web security will focus on detecting and protecting attacks on web applications and on application layer attacks. This includes XSS attacks, XML attacks DOS attacks, DDOS attacks, Slow DDOS attacks, JSON violations, Protocol violations etc. However, Security of database will be different than the rest of security and should be based on following best practices

 

  • Physical and Network Access Security.
  • Access control by managing the database access strictly.
  • Encryption of Data
  • Authentication  
  • Web Application Firewalls  
  • Controlling Database Integrations
  • Manual and Scheduled Backups through secured channels.  
  • Auditing and Logging
  • Reporting and Monitoring

Explanation:

<em>Physical and Network Access Security is essential </em>as the database will be hosted on many physical servers or cloud servers. If the databases are hosted on web or cloud servers and gaining access to such servers will eventually give out root user permissions.

Attackers can have control access of databases as root users if they succeed in getting into physical servers.Use of network firewalls and Intrusion detection and prevention systems will provide security against physical system access.

<em>Access control </em> will allow only specific users to access the database. User Based access control will give restricted or policy based privileges to different users. An user will be allowed to perform only certain actions in such cases which will avoid user-access abuse.  

<em> </em><em>Data encryption</em><em> </em>will make sure that eves dropper will not be able to read any data during transmission or during inter process calls. Authentication mechanisms will help to use strong cryptic authentications for users. Use of great encryption, key exchange and hashing algorithms will harden the security and will make databases robust.  

<em> Web Application firewalls</em> will provide a strong security against SQL injection attacks, database connection flood attacks, other web related attacks which will safeguard the databases at the cloud storage and also will block the attacker by flagging them.  

<em>Best coding practices</em> and vulnerability scanning and assessment will secure all the database integrations. <em>Database integrations</em><em> </em>with other components needs to be carried out with utmost care by making sure to analyse all the impacted areas.  

It is always a good practice to have <em>scheduled and manual backup of databases</em> which will be useful against data corruption because of erroneous user actions. This will ensure that data is safe and can be recovered during toxic situations. This will help to control the damage.  

<em> Auditing of logs</em> to verify all the actions performed on the database by different users is necessary as it will help to analyse any misbehavior or compromised user access. <em>Monitoring and reporting</em> will make sure that only the right user has the right access and also it will alert any attacks on the database system.

8 0
4 years ago
When you exit an office app, if you have made changes to a file since the last time the file was saved, the office app displays
Lubov Fominskaja [6]
<span>Yes, it is true that if we exit an office app we prompted by one dialog box that we want to save the changes to the file or not.It is one of the good option in Microsoft office product if we close the file accidentally it will display the dialog box to choose the options.In that dialog box if we click save changes button it will save the changes what we made new into the file.Then if we click don't save changes button it won;t make any new changes into the file.If we click cancel button it will return to the page we are working on it.</span>
4 0
4 years ago
Other questions:
  • Are sql injections legal?
    15·1 answer
  • you are configuring a wireless connection on your home router. Because you live in an apartment complex, the level of security i
    5·1 answer
  • Which of the following statements is true of offshore outsourcing?a. Improved telecommunication systems have increased its attra
    10·2 answers
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants
    5·2 answers
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • A measuring cylinder is used to measure the volume of an irregular<br>solid object.​
    5·1 answer
  • Verify (valid or not valid) using resolution the following reasoning: "Every student in the SCIS is a CS student or an IT studen
    15·1 answer
  • Which of the following are true about cryptocurrency wallets?
    8·1 answer
  • Which of these is NOT an example of lifelong learning?
    6·1 answer
  • Pls help I will give points
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!