1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
12

A content-managed site can be customized _____.

Computers and Technology
1 answer:
natita [175]3 years ago
3 0

Good question. The best answer is that it all depends on your project's specifications. Here are a few scenarios where a custom CMS would make sense:

You have security concerns or corporate security requirements that would make off-the-shelf platforms unacceptable. An example of this could be stringent security requirements that limit the amount of software licenses allowed, or that require tightening so severe that it would inhibit the ability of the platform to operate correctly. Also, remember that off-the-shelf platforms are more susceptible to random attacks by bots and other automated attackers.

You require advanced features. If you plan on having a website requiring advanced customization, evaluate if you are pushing the limits of off-the-shelf CMS platforms. An example would be software that is core to your business that must be custom built on top of the CMS platform. Future risks could be the inability to run a proper software update, or even worse, a software update breaking your custom code. It happens all the time!

You might be interested in
What's a False statement about online time? A. Blue light from devices can make it hard to sleep. B. It's a good way to connect
mylen [45]

Answer:C

Explanation: This has no basis while the others have studied behind them.

4 0
4 years ago
A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the prin
ki77a [65]

Verify the USB cable is attached

Answer: Option A.

<u>Explanation:</u>

The USB cable utilized for printers is known as a USB AB cable, named for the attachments on each end. The USB-An end is a level, rectangular fitting; the USB-B end is a square attachment with two bended edges, which goes into the printer.

A USB link associates your printer to your PC, so you have an immediate association each time you print. Most of printers are good with a USB 2.0 A/B link. This is a standard link that is generally accessible and it can likewise be utilized to interface a few mice and cameras to your PC as well.

7 0
3 years ago
A proxy is
salantis [7]

Answer:

C. an authorization of a registered stockholder to another person to act in their place at the meeting

Explanation:

  • The proxy server acts as a gateway between you and the Internet.
  • it is a Intermediate Server separates users from browsing websites
  • Therefore, the proxy here refers to allowing someone to act on their behalf. In the case of the company, the proxy allows another person to act on behalf of the registered stockholder at company meetings.
4 0
3 years ago
Highlights the possible risks and problems that should be addressed during the implementation process
Llana [10]

Answer:

The answer is below

Explanation:

Since the type of Implementation is not stated specifically, it is believed that, the question is talking about ERP Implementation, because it is related to subject in which the question is asked.

Hence, Enterprise Resource Planning (ERP) implementation deals basically, by carrying out installation of the software, transferring of finanancial data over to the new system, configuring application users and processes, and training users on the software

ERP Implementation Risks involve the following:

1. Inefficient Management and Project Activities.

2. Inadequate or No Training and Retraining of Customers or End-Users.

3. Inability to Redesign Business Processes to meet the Software requirements.

3. Incompetent or lack of Technical Support Team and Infrastructure.

4. Incapability to Obtain Full-Time Commitment of Employee.

5. Failure to Recruit and Maintained Qualified Systems, and Developers.

6 0
4 years ago
?What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
pickupchik [31]
Open flow protocol is used
6 0
3 years ago
Other questions:
  • WILL MARK BRAILIEST IF ANSWERED FAST!!!
    8·1 answer
  • A touch screen is classified as a special type of scanning device true or false
    15·1 answer
  • Earthquakes happen in the Earth’s
    10·1 answer
  • The network of satellites monitoring continental movement is referred to as
    7·1 answer
  • Given an list of N integers, Insertion Sort will, for each element in the list starting from the second element: Compare the ele
    8·1 answer
  • What is grid computing? It is distributed computing where autonomous computers perform independent tasks. It is interconnected c
    12·1 answer
  • A very early version of a game that doesn't have all the parts is called
    14·1 answer
  • What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websit
    6·1 answer
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!