Answer:
Explanation:
1) the versions of JavaScript that are fully supported by all modern browsers ( Except internet explorer 9) are:
C. ECMAScript 3, ECMAScript 5
2) JavaScript is used to implement complex features on a_____
A. web page
3) computer programming tools that are used to store data are called____
C. variables
4) var name = Scott; is the code to create a ____ called "Scott"
D. None of the above
Scott is a variable
5) the key difference between "var" and "let" variables is that____
D. None of the above
let is used to redefine a variable by using var to redefine may cause problems
6) Hoisting in JavaScript is the process whereby declarations get moved to the____
C. top
7) Im JavaScript, "/ /" is used to code____
A. comments
8) ______ data types have two potential values - true and false.
D. None of the above
Boolean is the data type and null is always false
9) Using ____ gives coders the ability to query data set data to create blueprints.
C. consoles
The Console object provides access to the browser's debugging console.
From what i learned from school, have a theme for the presentation and only have 1-3 pictures per slide that aren’t too big but small enough so you can read and see, also pictures that are self explanatory
Answer:
yes administrators have to be concerned
Explanation:
It is necessary for countermeasures to be taken against DoS attacks
The types of attacks that can still occur are:
If the network connection get to be overloaded, there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.
To reduce the impact of this kind of attacks,
1. there should be enough or excess network bandwidth and distributed servers should be replicated if there is a possibility that network could get to be overloaded.
2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.
3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters
4. Use strong antivirus on computer sytems that are used to connect to the internet
Authentication can be done by the issuer of the security.
What do you mean by authentication?
Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.
Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.
To learn more about authentication
brainly.com/question/28240257
#SPJ4
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is the planning stage. Because the planning stage represents the development of documents that provide the basis for acquiring the resources and for developing the requirement document. at this stage, you plan about what you are going to develop and how to develop it. At this stage, you come out mainly with two documents i.e. project proposal and requirement document.
Other options are not correct because:
In the project management, after planning, you will start designing the product, and after designing you start developing the product, and at the implementation stage, you implement or deploy the product to the customer or to the client. The requirement document that is developed at the planning stage can be used in the later stages of the project.