1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
9

Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud

ience-development technique describes the process Nicolai wants to implement?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Visitor tracking
B

Push technology
C

Pull technology
D

Search Engine Optimization (SEO)
Computers and Technology
1 answer:
fgiga [73]3 years ago
8 0

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

You might be interested in
Insecurely attached infants who are left my their mothers in an unfamiliar setting often will
Temka [501]

Insecurely attached infants who are left my their mothers in an unfamiliar setting often will Hold fast in their mothers in their return.

A. Hold fast in their mothers in their return

<u>Explanation:</u>

It is in the conscience of the infants to have the company of their parents no matter the place or time and do not generally like to be left alone. Moreover, the questions says, insecurely attached infants which further add up to this behavior.

The infant would not explore the surroundings due to lack of confidence in an unfamiliar setting. They would rather be uncomfortable and most probably weep the time until their mother arrives and hold fast on to them on their return.  

8 0
4 years ago
You need to fax a portion of a map from a large hard-cover atlas to a client from an internal fax-modem. To fax the map, the bes
Kay [80]
The fax modem is used to send and receive fax messages by only having phone line (fax machine is not required). The scanned documents should be saved as digital file (image or PDF format) in order to be sent. So, in order to send a portion of a map you should first convert the map into digital file and than simply send it through the fax modem. The best way to convert it to a digital file is to use an optical character recognition (OCR). 
6 0
3 years ago
The count_users function recursively counts the amount of users that belong to a group in the company system, by going through e
elena-s [515]

Answer:

# The count variable should be defined in a global scope.

count = 0

def count_users(group):

for member in get_members(group):

 count += 1

 if is_group(member):

  count += count_users(member)

return count

 

print(count_users("sales")) # Should be 3

print(count_users("engineering")) # Should be 8

print(count_users("everyone")) # Should be 18

Explanation:

The count variable should be defined in a global scope which means that it shouldn't be defined inside the scope of the count_users function.

The reason is that count_users is a recursive function and when it is called recursively then it will be setting the count variable to 0 again and again, hence instead of keeping the count of users, it will lose the value all the time serving no purpose. But when it's defined outside the function then it will not initialized again in the recursive calls.

6 0
4 years ago
6.12.1: Return number of pennies in total. Write a function NumberOfPennies() that returns the total number of pennies given a n
Anit [1.1K]

Answer:

public class Pennies

{

public static void main(String[] args) {

 System.out.println("Total pennies: " + NumberOfPennies(5, 6));

               System.out.println("Total pennies: " + NumberOfPennies(5));

}

public static int NumberOfPennies(int amount, int pennies) {

    int total = (amount * 100) + pennies;

   

    return total;

}

public static int NumberOfPennies(int amount) {

    NumberOfPennies(amount, 0);

    int total = amount * 100;

   

    return total;

}

}

Explanation:

- Create a function called NumberOfPennies that takes two parameters, amount and pennies

- In order to calculate the number of pennies, multiply the given amount by 100 and add the pennies. Set this result to the total and return the total.

- Since pennies parameter should be optional, overload the function NumberOfPennies so that it can take one parameter, amount. When it takes one parameter, the value of the pennies set to 0.

Inside the main, call the function with two possible scenarios

3 0
3 years ago
What utility is used to verify that tcp/ip installed, bound to the nic, configured correctly, and communicating with the network
klasskru [66]
<span>PING is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network. Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time.</span>
6 0
4 years ago
Other questions:
  • What IEEE 802.11 wireless standard supports devices only in the 5GHz range with speeds up to 4.9Gb/s because of accepting data f
    12·1 answer
  • Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
    12·1 answer
  • The points where budget lines are tangent to indifference curves are used to derive the demand curve. A. False B. True
    6·1 answer
  • A cable that connects the computer to the printer is an example of<br> A.hardware<br> B.software
    13·2 answers
  • What is 10x10????????????????/
    5·2 answers
  • You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
    10·1 answer
  • WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
    14·2 answers
  • A friend of Alex has gifted a movie collection, and Alex is excited to watch them all as quickly as possible. The duration of th
    11·1 answer
  • Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
    7·1 answer
  • What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!