1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
2 years ago
5

What is the basic facilities, services, and installations needed to keep a

Computers and Technology
1 answer:
lara31 [8.8K]2 years ago
7 0

Answer:

transportation and communications systems, water and power lines, and public institutions like schools, post offices, and prisons.

Explanation:

You might be interested in
In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the gr
vekshin1
Regroup i think that is the answer

6 0
4 years ago
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
Complete the sentences about interactive media.
maksim [4K]

Answer:

teletext

dynamic media

Explanation:

5 0
3 years ago
I am a receptionist for a large corporation
Musya8 [376]
Therefore the answer is within yourself
5 0
4 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
Other questions:
  • ______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
    6·1 answer
  • What is the name of the malware included in CCleaner?
    11·1 answer
  • Which notification appears on the screen when a new Outlook item arrives?
    10·1 answer
  • Which institution developed outside the limits of the written costitution of the united states ?
    14·1 answer
  • 1) Type a statement that gets an input value into variable numBers. Assume scnr already exists and numBers has been declared.
    9·1 answer
  • Every presentation should have a beginning, a middle, and an end.
    10·1 answer
  • What steps should you take if your harassed online​
    9·2 answers
  • Some people worry that there won’t be enough jobs in the future because computers will be able to do everything better than peop
    7·2 answers
  • Which term accurately describes agile and devops
    5·1 answer
  • Chloe is not pleased with how four images that she has placed on a web page relate to each other. Which search string will be mo
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!