Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which audience-development technique describes the process Nicolai wants to implement?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Visitor tracking
B

Push technology
C

Pull technology
D

Search Engine Optimization (SEO)

Answers

Answer 1

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.


Related Questions

In Excel, how many columns can be filtered at a time?

Answers

Answer:

When you apply the Filter function, after filtering one column, the next columns will be only filtered based on the result of the previous filtered column. It means that only AND criteria can be applied to more than one column.

Explanation:

Hope it helps you!

Program C++ I need help!

Answers

Answer:#include <iostream>

using namespace std;

int main()

{

   int factorial = 1;

   for (int i = 5; i > 0; i--) {

       factorial = factorial * i;

   }

   cout<<factorial;

   return 0;

}

Explanation:

what is a client server network and its features?​

Answers

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

.
Which testing requires coding the test cases into a scripting language?
( blank) testing requires coding the test cases into a scripting language.

Answers

The blank is smart testing requires coding the test cases into a scripting language

The Automation is smart testing requires coding the test cases into a scripting language.

What is test scripting language?

A TEST SCRIPT is known to be a form of compositions of instructions that is known to be carry out on a system under test to see if the system can performs as it was expected.

Hence, the use of  for Automation testing is smart testing requires coding the test cases into a scripting language.

Learn more about scripting language from

https://brainly.com/question/26103815

importance of information technology in marketing​

Answers

Answer:

it helps u to convey it to more ppl by using by means of mass of communication which helps it

Customer service has improved.

5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?

Answers

Well the awnser that you are looking for is not here and I am verry sorry about that I just need points for my awnser

Which type of data is shown below?
apple, 0.85
banana, 0.90
peach, 1.50

Answers

Answer:

dictionary data

Explanation:

data = {"apple" : 0.85, "banana" : 0.90, "peach": 1.50}


when should you stop where you are, drop to the
cover your face with your hands, and roll over and over?
A
if you burn a stump
B
if your clothes catch fire
if you draw a cool bath
if your top layer of skin is damaged

Answers

Answer:

A . if you burn a stump because if u roll over the fire will have a 90% chance of going out

Write the syntax.

1. for loop

2. while loop

3. function definition

4. function call

5. do while loop​

Answers

Answer:

Explanation:

The following syntax's are written in Python and perform a very basic arithmatic operation within the loop of call as an example

1.    for x in range(3):

       print(x)

2.    count = 0

      while True:

          print(count)

          count += 1

          if count == 4:

              return False

3. def next_pow2():

       return 3**2

4. next_pow2()

5. i = 1

while True:

   print(i)

   i = i + 1

   if(i > 3):

       break

#Python doesn't have an explicit do-while loop but can be emulated exactly as a do-while loop using the format written in answer 5.

Use the drop-down menus to match each description to the correct type of form.
A form appears after opening a database, asking if you would like to view the fruits table, vegetables
table, or nutrition report:
Student test scores entered into a database:
A window appears before closing out of a database, asking you to save your work before exiting:
A basic form to input names, addresses, phone numbers, and e-mail addresses:
A suppliers form that contains a products form and a price form that pops up when you click on the Prices
button:
A form used as the basis of many websites because of its top-level organization system:
A form that has replaced the outdated switchboards:

Answers

Answer: switchboard, data entry, switchboard, flat, synchronized, navigation, navigation

Explanation: edgenuit work

Answer:A form appears after opening a database, asking if you would like to view the fruits table, vegetables table, or nutrition report:

✔ switchboard

Student test scores entered into a database:

✔ data-entry

A window appears before closing out of a database, asking you to save your work before exiting:

✔ switchboard

A basic form to input names, addresses, phone numbers, and e-mail addresses:

✔ flat

A suppliers form that contains a products form and a price form that pops up when you click on the Prices button:

✔ synchronized

A form used as the basis of many websites because of its top-level organization system:

✔ navigation

A form that has replaced the outdated switchboards:

✔ navigation

edge 2023

Question 3 5 points)
Which one is NOT a factor that impact the total cost of a tool or piece of equipment.

Answers

where are the choices?

Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

A digital certificate
B

A certificate authority
C

An Electronic Funds Transfer (EFT)
D

A payment gateway

Answers

Answer:

B is more probable option than C

Explanation:

I think its both B and C

A certificate authority does Secure Sockets Layer (SSL) used to authenticate a user or system before encrypting a session. Hence, option B is correct.

What is Secure Sockets Layer (SSL)?

Secure Sockets Layer (SSL) is a security protocol used to establish an encrypted link between a web server and a web browser. It was replaced by Transport Layer Security (TLS) as the standard protocol, but the term "SSL" is still commonly used to refer to both SSL and TLS.

When a user enters a website using SSL/TLS, the website's server sends a public key to the user's browser. The browser then uses this public key to encrypt data that is sent back to the server.

This helps to prevent third parties from intercepting and reading the data being transmitted.

Thus, option B is correct.

To learn more about the Secure Sockets Layer (SSL), follow the link:

https://brainly.com/question/25401676

#SPJ2

Is Conflict Healthy ?

Answers

yes

Explanation:

because it has more things

No not really I mean I don’t think so but other people might have other Pennies

nog
*
24. QUESTION 21:
Peacekeeper text is non-printing text that indicates where you can type.
(2.5 Points)
True
False

Answers

Answer: False

Explanation:

The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.

The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.

If you were at the front of a long line of people, stepped onto a chair and took a
picture of the line going back in the distance, what is the best F-Stop to use if you
want only the people in the middle to be in focus?

Answers

They are closer to the people and they work than a senior management

One advantage of the Second generation of programming language is that it is machine dependent. True or False

Answers

Answer:

I THINK FALSE

Explanation:

Your program analyzes complex data.
You are going to read text from a file as part of your program.
The program is saved in a folder, which has a subfolder called "numbers."
In the info folder is a text file called "sales.txt."
Which line of code will open sales.txt?
O results = open("sales.txt","r")
O results.open("sales.txt", "w")
O results = open("numbers/sales.txt","r").
O results = open("numbers/sales.txt", "w")

Answers

results = open("numbers/sales.txt","r")

Database Management Systems are featured with:

Question 3 options:

The facility to easy editing, spelling check, auto pagination, lay out and printing reports


The ability to store large amount of data to facilitate easy update, sort and retrieval


The ability to calculate efficiently with the help of built-in functions and analyze


None of the above

Answers

Answer:

Answer: Database Management Systems are featured with:​ The ability to store a large amount of data to facilitate easy updates, short, and retrieval.

Explanation: I took the test

This line of code is in your program.
outFile = open("another.txt", "a")
How will outFile interact with the file it opens?

Answers

Answer:

it opens the file for appending

Answer:

write to the file, adding to the current contents of the file

Explanation:

The "a" stand for append. To append means to add onto the file.

I hope this helped!

Good luck <3

Determine the value for the following recursive method when x = 19.

Answers

Answer:

[tex]f(19) = 2[/tex]

Explanation:

Given

[tex]f(x) = f(x - 5)+ 2[/tex] --- [tex]x > 9[/tex]

[tex]f(x) = -2[/tex] --- [tex]x \le 9[/tex]

Required

Find f(19)

f(19) implies that: x = 19

Since 19 > 9, we make use of:

[tex]f(x) = f(x - 5)+ 2[/tex]

[tex]f(19) = f(19 - 5) + 2[/tex]

[tex]f(19) = f(14) + 2[/tex] ----- (1)

Calculate f(14)

f(14) implies that: x = 14

Since 14 > 9, we make use of:

[tex]f(x) = f(x - 5)+ 2[/tex]

[tex]f(14) = f(14 - 5) + 2[/tex]

[tex]f(14) = f(9) + 2[/tex] ------ (2)

Calculate f(9)

f(9) implies that: x = 14

Since [tex]9 \le 9[/tex], we make use of:

[tex]f(x) = -2[/tex]

[tex]f(9) = -2[/tex]

So:

[tex]f(14) = f(9) + 2[/tex]

[tex]f(14) = -2 + 2[/tex]

[tex]f(14) = 0[/tex]

[tex]f(19) = f(14) + 2[/tex]

[tex]f(19) = 0 + 2[/tex]

[tex]f(19) = 2[/tex]

_____ can be lost or stolen by cybercriminals. Select 2 options.

Free WiFi

Computer devices

Computer networks

Antivirus software

Portable devices

Answers

Answer:

Free WiFi

Computer networks

Explanation:

They cant really take your stuff they can only take virtual objects.

Free Wifi and Computer Networks

Read the following examples, and decide whether each example describes a relational database or a flat
file. Use the drop-down menus to make your selection.
An author keeps track of income and expenses in a table:
A college admissions department stores detailed information about each applicant, including his or her
full name, address, high school, GPA, standardized test scores, intended major, and entrance exam
scores:
A social media website has many users who are allowed to upload photos, videos, and information about
themselves:
A library stores information about patron names, account numbers, books out on loan, the date books are
due, the date books are returned, the number of days a book is overdue, and overdue book fines; this
information allows the system to e-mail or call patrons to remind them to return books on time:

Answers

Answer: flat file, relational database, relational database, relational database

Explanation:

Edge

Answer:

1. flat file

2. relational detabase

3. relational detabase

4. relational detabase

Explanation:

on edg

2. Android 1.1 was internally referred to as _________.



3. A large C program is divided into basic building blocks called as _________.



4. __________ are the in-built function in C programming system.



5. ______________ are special variables which can hold more than one value using the same

variable, using an index​

Answers

Answer:

2. petit four

3. function

4. library functions

5. array

plz help asap

Question # 2
Multiple Select
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.

software bugs

negligence

lack of knowledge

inattention

malware

Answers

Answer:

I'd say negligence, lack of knowledge and inattention

Other Questions
YOOOO HELP ME OUT W SPANISH MY PEOPLE Billy conducted an experiment by rolling a a standard number die 500 times.During this experiment he rolled a three 120 times. What is the theoreticalprobability of rolling a three on a standard number die? Does 514, 684, 855 make a right triangle Point C is graphed at (-4, -10). What is the coordinate of C' after a reflection over the y-axis . Read this excerpt from "Wiley, His Mama, and the Hairy Man in The People Could FlyWell, when Wiley got himself home, safe, he told his mama that the Hairy Man had almost got him that time. Hairy Man would have, too, but that he pretended to pray and called his hounds instead and the hounds run the Hairy Man off."Did he have his sack?" his mama asked Wiley."Yesum," Wiley said."Next time he come after you, don't you climb some tree," said his mama.What theme is suggested by this excerpt?Refusing to fight solves problems.It is better to hide from a problem than to face it directly.Always stick to the first plan you make to solve a problem.It is important to listen to others advice. A triangle with sides 9, 12 and 15 is similar to a triangle whose longest side is 25. Find the perimeter of the larger triangle. What is the slope of the graph of the line y=2x-3 Complete the proof by providing the missing reasons. I need help on this and the person that answer this question correctly gets a BRANLIST Solve i dont know if this is one or 2 step equation I need help with number 4 how has president power expanded over time? All of the following can take material into cells exceptO active transportO exocytosisO endocytosisO passive transport PLZ HeLPFind the volume of this triangular prism.Be sure to include the correct unit in your answer.hight 5m base 5m other base 9m Which of the following was not an effect of the Three Gorges River project in China?A.Ecosystems were destroyed.B.The Yangtze River dried up.C.People were displaced from their homes.D.Natural floods and sediment patterns were disrupted. Can someone help me plzzz Factor the expression3x^{2}+16x+5 IS THIS ABAB OR ABBA!!!!! Read the following excerpt from Greece by Oscar Wilde.The sea was sapphire [colored], and the skyBurned like a heated opal through the air;We hoisted sail; the wind was blowing fairFor the blue lands that to the eastward lie.Which pattern describes the rhyme scheme of this stanza?ABABAABBABBAAAAB The quotient of z and 8 need help this is my last chance 10. The angle measures of a triangle are shown in the diagram below.(2x +1)(5x +5)What is the value of x? x = 25 x = 14 x = 12X= 7