1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
12

A content-managed site can be customized _____.

Computers and Technology
1 answer:
natita [175]3 years ago
3 0

Good question. The best answer is that it all depends on your project's specifications. Here are a few scenarios where a custom CMS would make sense:

You have security concerns or corporate security requirements that would make off-the-shelf platforms unacceptable. An example of this could be stringent security requirements that limit the amount of software licenses allowed, or that require tightening so severe that it would inhibit the ability of the platform to operate correctly. Also, remember that off-the-shelf platforms are more susceptible to random attacks by bots and other automated attackers.

You require advanced features. If you plan on having a website requiring advanced customization, evaluate if you are pushing the limits of off-the-shelf CMS platforms. An example would be software that is core to your business that must be custom built on top of the CMS platform. Future risks could be the inability to run a proper software update, or even worse, a software update breaking your custom code. It happens all the time!

You might be interested in
A computer has a cache and main memory. 20 ns are required to reference a word that is in the cache. If the word is in main memo
Alecsey [184]

Answer:

T_{average} =12026ns

Explanation:

Given Information:

T_{cache}=20 ns

T_{main}=60ns

T_{disk} =12ms=12,000,000ns

hit_{cache} =0.9

miss_{cache} =1-0.9=0.10

hit_{main} =0.99

miss_{main} =1-0.99=0.01

There are 3 possible cases

1. Location of reference word is in cache

T_{cache}*hit_{cache} =20*0.9=18ns

2. Location of reference word is not in cache but in main memory

(T_{cache}+T_{main})*(miss_{cache}*hit_{main}) =(20+60)*(0.10*0.99)=7.92ns

3. Location of reference word is neither in cache nor in main memory

(T_{cache}+T_{main}+T_{disk})*(miss_{cache}*miss_{main})

(20+60+12,000,000)*(0.10*0.01)=12000.08 ns

The average time required to access a referenced word on this system is simply the sum of above 3 cases

T_{average} =18+7.92+12000.08=12026ns

5 0
3 years ago
The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
FinnZ [79.3K]

Answer:

Information processing model

<em>Hope it helps!</em>

3 0
2 years ago
T/F: The government seized control of wireless communications in the early days in order to stabilize the market and break up em
DedPeter [7]

Answer:

The answer is False.

Explanation:

The event mentioned in the question is the government taking control of the wireless communications throughout during the late 1910s around the time the wireless technologies such as radio communications were introduced. They became very popular because they were used heavily during WWI and they weren't easily interceptable or cut-off like the land lines used by telegraphs and such. The government took control of the wireless communications for safety during WWI, not in order to stabilize the market and to break up emerging monopolies. So the reason in the question is wrong.

I hope this answer helps.

5 0
3 years ago
PLEASE HELP, PLEASE THIS C++ CODE WON'T WORK IDK WHY CFBundleDevelopmentRegion English CFBundleDisplayName DOSBox CFBundleExecut
skad [1K]

Answer:

Explanation:

There are such things as compiler bugs and even operating system bugs in which a program error-free itself fails to execute correctly.

For anyone including even the most experienced programmers, the overwhelming probability is that is not what is happening here.

There is only really one way to debug programs. Divide and conquer.

Enable all warnings in your compiler, find out what all the warnings mean, and drive them out or (not preferred) convince yourself that isn’t the problem

Keep trying to sub-divide the bit you think is wrong until you realize your error and fix it. If you come to the conclusion that bit is fine and the error exists earlier, but only exhibits at that point, change the program to test components in complete isolation.

If you come to a bit that you really can’t work out why it’s doing what it does, write a small standalone program that doesn’t do what you expect and post a question on Stack Overflow being clear about what you expect as the output and what you get.

Or

You didn’t write the correct instructions to reach your objective. It’s easy to write a program that nothing at all correctly and still compiles error-free. The compiler only spots the most glaring errors.

Hope this helps

5 0
3 years ago
In data representation, what represents one character which may be a
jekas [21]

Answer:

Binary ?

Explanation:

Im not 100% sure but it could be binary or 0

7 0
3 years ago
Other questions:
  • In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the
    8·1 answer
  • Which of the following groups would an animal with an exoskeleton, segmented body, and jointed appendages belong to???
    14·2 answers
  • Do routers have ip addresses? if so, how many?
    10·1 answer
  • When two files are linked together, the __________ file receives the data from another workbook.?
    7·1 answer
  • A detective agency is looking to bust an arms sale. According to available intelligence, the sale is likely to happen in one of
    11·1 answer
  • John works in the Sales and Marketing group. Why does his group need to interact with operations management to plan the launch o
    12·1 answer
  • How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
    12·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • I am getting two expected errors on this code for the bottom two “public static void” lines. Can someone tell me how I can fix i
    5·1 answer
  • Catherine, a web designer, has created new content for a client's website. In order to update the company website, she needs to
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!