1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
10

What job does a back-end developer perform?

Computers and Technology
1 answer:
Diano4ka-milaya [45]3 years ago
6 0

Answer:

Handles what happens behind the scenes on websites

Explanation:

The website back end is made up of server, an application, and a database. The back-end developer builds and coordinate these components together. Back end developers manage the technical side of the websites (that is what the users do not see on the website).

The back end developer needs to know how to program using PHP, java, Python, Ruby, as well as use tools such as MySQL, Oracle, and SQL Server.

You might be interested in
The smallest network
katrin [286]

Smaller networks include LANs or MANs.

Hope this is what you were looking for!

3 0
3 years ago
Kayla is working on a document for her business meeting. She wants to save this document with another name. Which option should
Fittoniya [83]
Kayla could use “save as” to rename the document.
5 0
3 years ago
The basic building blocks of java is known as<br><br><br><br>Reply fast! plzzzzzzzzzzz!!!
Nadya [2.5K]

Answer:

A class is the basic building block in Java.

8 0
3 years ago
In addition to meeting OSHA standards, the Department of Defense requires each military department, including the Department of
professor190 [17]
The correct answer is: DoD Instruction 6055.1 which is known as DoD Occupational Safety and Health Program.

<span>In addition to meeting OSHA standards, the Department of Defense requires each military department, including the Department of the Army, to administer a comprehensive safety and occupational health program. The requirement appears in this document.</span>
3 0
3 years ago
assume for arithmetic, load/store, and branch instructions, a processor has CPIs of 1, 12, and 5, respectively. Also assume that
KonstantinChe [14]

Answer:

1 PROCESSOR :

(1 × 2.56 × 10^9) + (12 × 1.28 × 10^9) + (5 × 2.56 × 10^8) / 2 GHz = 9.6 s

2 PROCESSORS :

(1×2.56×10^9)+(12×1.28×10^9)/0.7×2 + (5 × 2.56 × 10^8) / 2 GHz = 7.04 s

Speed -up is 1.36

4 PROCESSORS :

(1×2.56×10^9)+(12×1.28×10^9)/0.7×4 + (5 × 2.56 × 10^8) / 2 GHz = 3.84 s

Speed -up is 2.5

5 PROCESSORS :

(1×2.56×10^9)+(12×1.28×10^9)/0.7×8 + (5 × 2.56 × 10^8) / 2 GHz = 2.24 s

Speed -up is 4.29

Explanation:  

The following formula is used in this answer:

EXECUTION TIME = CLOCK CYCLES / CLOCK RATE

Execution Time is equal to the clock cycle per clock rate

7 0
3 years ago
Other questions:
  • Two electronics technicians are measuring electrical quantities in circuits. Technician A says that copper, glass, porcelain, an
    13·2 answers
  • What is the relationship between IaaS and TCP/IP and network services?
    10·2 answers
  • Marco is ready to create his first slide. He wants to put the title of the
    11·1 answer
  • Andrew will use the _____ picture option to add a new image. ??
    15·2 answers
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • How many pairs of chromosomes do human body cells contain?
    7·2 answers
  • A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
    12·1 answer
  • Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.
    9·1 answer
  • How to tell if your cell phone is being tracked tapped or monitored by spy software?
    12·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!