Discussion Topic:
Web maintenance plays a vital role in a website's development. It helps ensure
the online presence of any website by performing regular updates. Discuss the
benefits of web maintenance.

Need help can someone answer plz

Answers

Answer 1

Answer:

Prevents lagging

Explanation:

This prevents the website from being slow and upto shape so those who access it dont have difficulties


Related Questions

Tynker has a particular layout, with the blocks on the left, editor in the middle, and output on the right. Which word best describes this screen layout?
block-based
interface
editor
player

Answers

Interface best describes the layout of the screen.  This is done by designers

in which they help to design the appearance and style of various software

and devices.

These characteristics help to ensure the users find them friendly and easy to

navigate through when performing various operations .

In this scenario, we were told that the layout has blocks on the left, editor in

the middle, and output on the right which are designs for easy navigation on

Tynker.

Read more about Interface here https://brainly.com/question/5080206

Answer:

interface

Explanation:

You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would make to the slide to make it more effective.

Answers

To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.

Answer:

I would add colors to the backround of the slide to decorate it and make sure it is not distracting, Use different fonts but dont make it too fancy.

Explanation:

Your Welcome

what type is the combination of an integer and a string

Answers

Answer:

Concatenation.

Explanation:

Can you help me to write a code with functions,arrays,and pointers in c++?
It can be a basic game or an interesting program.
But a little bit complicated :)
Please I need help :(((​​

Answers

Answer:

Your search for complete and error-free projects in C and C++ ends here! Here, we’ve enlisted all the mini-projects, projects, games, software and applications built using C and C++ programming language — these are the projects published in our site or available with us at the moment. You can download all these projects (with source code) for free; make sure to check their individual post description as well.

First thing, most students learn C and C++ as their first programming language. They quickly become able to write programs that include functions, arrays and pointers, file handling and data structure, etc. But, when it comes to building a mini-game, an application, or a small project, incorporating all these features in one compact program becomes difficult.

In such case, reference projects always come in handy. The C and C++ projects published in our site will teach you how to get started, give you ideas and topics regarding your project, and sharpen your programming skills in C and C++. Here, you’ll find short and simple as well as long and complicated projects.

Write steps of the following operations.
a. applying borders and spacing
b. create a folder​

Answers

Answer:

b

Explanation:

first right click on an empty space

click on new from the pop up menu

finally click on new folder

which type of writing is most commonly used in the field of information technology

Answers

Answer:

Technical writing

.........

Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially.

Required:
Which character can he type after each command to have them run one after the next without requiring further input from him?

Answers

Answer:

um

Explanation:

what subject is this again?

IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False

Answers

Answer: true

Explanation: true

_____ are fields that are used to personalize a mail merge document
A. rows of a spreadsheet data source
B. Excel workbooks
C. columns of the spreadsheet data source
D. cells

Answers

Answer:

The answer is A; rows of a spreadsheet data source.

Explanation:

Select all that apply
photoshop question

Form is gives the object this look?

a. Flat

b. Textured

c. Dark

D. 3d

Answers

It should be D and B

what hash format are modern windows login passwords stored in?

Answers

User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.

What are the windows?

Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.

A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.

Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.  

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ5

What is the correct method to reset the contents of the CMOS NVRAM on HP Desktop / Workstation computers after the AC power has been disconnected

Answers

It should be noted that in order to reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

It should be noted that the non-volatile RAM simply means a complementary metal-oxide-semiconductor chip that can be found inside computers which is vital for storing information.

To reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

Learn more about computers on:

https://brainly.com/question/24540334

what is control structure write it's types​ .

Answers

Answer

Defination-:

A control statement is a statement and a statement whose execution its control.

Types-:

Selection StatementIteration StatementUnconditional branching Statement

How many letters is in whatyoudoingareyougood

Answers

Answer:

43847823773 letters

Explanation:

haha to easy

Answer:

22 letters, 6 words.

:) hope this helps! <3

Which of the following rules need to be followed when using variables?
Choose all that apply.

Answers

Answer:

- All variable names must begin with a letter of the alphabet or an. underscore( _ ).

-After the first initial letter, variable names can also contain letters and numbers.

-Uppercase characters are distinct from lowercase characters.

-You cannot use a C++ keyword as a variable name.

Answer:

Variable names must begin with a letter or an underscore( _ )

After the first initial letter, variable names can also contain letters and numbers. ...

Uppercase characters are distinct from lowercase characters. ...

You cannot use a keyword as a variable name.

Explanation:

What are some of the restrictions to muscle wire?

Answers

Answer:

Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.

In Super Mario Bros., you become Mario and your friend is Mario’s younger brother Luigi. Your job is to race through Mushroom Kingdom to save Princess Toadstool and avoid the enemy, Bowser. You can jump from and to different objects, picking up coins and other items to help you on your journey through the levels. What game genre (or combination of genres) best describes this game?

A.
strategy simulation
B.
action adventure
C.
RPG
D.
sports action

Answers

B action adventure ——————

Why would you add learning inside the app? A. To add contextual help for each page in the app B. To contact Salesforce support C. To link to your company’s onboarding resources D. To add resources about working in Salesforce Classic E. A and C

Answers

There are different reasons why there was the addition of learning to the app. The reasons why you would you add learning inside the app is that:

To add contextual help for each page in the app.

To link to your company’s onboarding resources.

Salesforce Learning Paths is known to result in bringing out the power of learning straight into the app.

It can help companies to update their teams as they function or work in Salesforce.

Through the use of the Learning Paths, firms whether big or small and other industry can update or equip their employees with timely, personalized learning in the flow of work.

This can therefore help employees of all experience levels by boasting their skills and in turn increase their productivity.

Learn more about Salesforce from

https://brainly.com/question/7452075

Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser

Answers

Answer:

Static

Explanation:

I just took the test man!

This is an image of the ...................... Topology. * If you get it right i will mark you brainlist ​

Answers

Answer:

Tree

Explanation:

2. It serves as the foundation of all crochet work. a. Chain stitch C. double treble b. Treble stitch d. slip stitch​

Answers

Answer:

a. chain stitch

because the foundation of so many crochet patterns involved a chain of × stitches followed by working sc/dc into the chain

which function would you use to change the appearance of data in a cell from decimal to percentage

Answers

Answer: use the numbers behind the decimal for the percentage

Explanation:

Answer:format

Explanation: I took the test

what are quantum computers and it uses​

Answers

Answer: Quantum computers are machines that use the properties of quantum physics to store data and perform computations

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

Not every design choice in your game interface requires having a thought process behind it.
True
False

Answers

Answer:

true

Explanation:

cause every design have it's own thought process and we also have our choice

Answer:

true

i agree with the person that answerd

Write a program to print sum on first 10 natural numbers.
#include
int main()
{
int i, sum;
for(i=1;i<=10;++i);
{
sum =sum + i;
}
printf("The sum is = %d",sum);
}

Answers

A program that prints the sum on the first 10 natural numbers is:

int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //

What is a program?

A computer program in a programming language is a set of instructions and commands written in a language that a computer can execute or understand. 

Using the For Loop program, the variables of the first 10 natural numbers can be written as:

int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //

Learn more about writing a program here:

https://brainly.com/question/23275071

Draw truth table for the following logic circuit:

(Please I really need help with this)

Answers

Keep Scrolling! :D

[tex] \rule{999pt}{66646pt}[/tex]

HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?

var titles = ["score", "points"];

titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");

Answers

Answer:

titles.push("home");

Explanation:

        It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.

        "... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)

[] Attached is from the same source

-> I think this is correct

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

1. Explain 'Computer Ethics" ?



plz following me ​

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.  or the computer experts making the decision regarding the social and professional behaviour while working while with the computer tools and technology is called computer ethics.

Explanation:

HELP ME PLEASE

explain 2 threats to data that can arise when a pc is not connected to the Internet​

Answers

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

Other Questions
Modernization inthe 20th and 21stcenturies.?Womenincreasingly workoutside the home.More young peoplemove away fromtheir families.Which statement best completes the diagram on the effects ofmodernization on families?A. Families place a greater value on religious traditions.B. Large families have mostly relocated to urban areas. aC. Fertility rates in developed countries have risen.D. Fewer extended families live in the same home, 1) According to section six of the passage, the easiest way to assemble the quilt is by using the reverse bag method. Based on thisinformation, you can tell that the authorA) invented the reverse bag method.B) dislikes the final steps in assemblyhas trouble assembling her own quilts.D) has used the reverse bag method before. Find the domain of the function Please help me asap. WILL GIVE BRAINLIST AND 25 POINTS!!! I NEED THIS DONE ASAP. Help help help math math math 4. What is the central idea from paragraph one?The current conflict in Sudan is only the latest chapter in the countrys violent history. Apart from an 11-year peace from 1972 to 1983, Sudan has been entrenched in war since it became an independent nation in 1956. The Darfurian conflict erupted just as a long civil war between northern and southern Sudan was winding down. That war was fought between the mainly Muslim Arab north and the mostly non-Muslim, non-Arab south. It began in 1983 and was one of the longest-lasting and deadliest wars of the 20th century. About 2 million civilians were killed, and more than 4 million people were forced to flee their homesA. The current conflict in Sudan is only the latest chapter in the countrys violent history.B. The Darfurian conflict erupted just as a long civil war between northern and southern Sudan was winding down.C. Conflict and war have been going on almost since the beginning of Sudan, and have left millions dead and displaced.D. There were 11 years of peace between 1972 and 1983 Which function has a greater rate of change? HELP PLEASE I DONT UNDERSTAND Evaluate this question does trade make people better off? Please quick! HELP PLZZZZZZZ with #1 Which are the products in the equation CH3SH + 4O2 CO2 + SO2 +2H2O? Check all that apply. CH3SH O2 CO2 SO2 H2O A balance of forces is demonstrated by an object which is slowing to a stop true or false help plsWhat is the main technique this poster uses to persuade the audience?plain folksglittering generalitiesname-callingtestimonials What is the ethical rebound to the thought of Joe Biden's advancements in diplomacy? What is the difference between frame of reference and bias? According to the demand-pull theory, inflation is caused by: Quantities that can be described completely by their magnitude or size are called vector quantities. What makes a cyclone rotate counter-clockwise north of the Equator and clockwise south of the Equator?1 Ocean currents2 Coriolis Effect3 the Jet Stream4 Landscape differences Which point represents the outlier Obesity has become a major health issue for North Americans. This issue is aggravated by the lack of physical activity in large segments of the population. In addition to healthier eating habits, one way to deal with this issue is to make it easier for obese North Americans to exercise on a daily basis. This could be done at work, before and after the shift, to ensure full participation in the programme.a) sequencingb) problem and solutionc) compare and contrast