1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
7

According to the video, what are some concerns of Webmasters? Check all that apply.

Computers and Technology
2 answers:
salantis [7]3 years ago
7 0

Answer:

1,5,6

Explanation:

hope this helps gg

zheka24 [161]3 years ago
5 0

Answer:

A.how fast the website can be accessed

E.the time it takes for elements on a website to download

F.website security and privacy

Explanation:

You might be interested in
The domain name system ________. Question 2 options: A) is a way to find a host's IP addresses if your computer only knows the h
ra1l [238]

Answer:

C) both a and b

Explanation:

13) The domain name system ________.

A) is a way to find a host's IP addresses if your computer only knows the host's host name

B) is a general naming system for the Internet

C) both A and B

D) neither A nor B

8 0
2 years ago
The __________ endian storage format places the __________ byte of a word in the lowest memory address. The __________ endian st
mr Goodwill [35]

Answer:

i. Big

ii. most significant

iii. little

iv. most significant

Explanation:

8 0
3 years ago
What is radial gradient in Flash CS3
djverab [1.8K]

Answer:

Radial gradients radiate from a center focal point. Both can be edited for color, alpha, and position within a fill or stroke. You can add up to 16 colors to a gradient, precisely control the location of the gradient focal point, and apply other parameters. A gradient behaves like any other fill or stroke.

8 0
3 years ago
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
Python 3.4
Dmitrij [34]
I = 0
while( i < ( n * 2 ) ):
   s += '*'
   i += 1
8 0
3 years ago
Other questions:
  • A publisher has a text-only leader board on top of a page, and a text-only small square ad slot within the content of that page.
    7·1 answer
  • Organisms that reproduce sexually​
    11·1 answer
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • What is a computer system?
    9·1 answer
  • What is the primary responsibility of the physical layer in data communication?
    8·1 answer
  • Lil fun question : burgers or pizza??
    6·2 answers
  • An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot c
    7·1 answer
  • Write a program that reads the balance and annual percentage interest rate and displays the interest for the next month. Python
    12·1 answer
  • Brainstorm what you want your LED board to do. What would need to happen first? What happens next?
    5·2 answers
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!