Search for articles describing front end and back end design of any application (example, a website). Summarize the concepts and elements for each one. Does the database that holds all the data exist at the front end or the back end

Answers

Answer 1

Answer:

No, the database is a back-end utility.

Explanation:

A webpage is a page of a website. The website is the collection of internet pages addressing particular information or service. There are two sides of web development, that is the front-end and back-end web development.

The front-end is the part of a website that interacts or is seen by the user of the website. The back-end developer scripts it to connect the server, route the webpages and communicate the data in the database.


Related Questions

Calculate the heat energy required to raise the temperature of 5 kg of water from 20℃ to

40℃. Specific heat capacity of water is 4200 J kg-1 k-1​

Answers

Given that,

Mass of water, m = 5 kg

The temperature increases from 20℃ to  40℃.

Specific heat capacity of water is 4200 J kg⁻¹ k⁻¹

To find,

Heat energy required to raise the temperature.

Solution,

The formula for the heat energy required to raise the temperature is given by :

[tex]Q=mc\Delta T\\\\=5\times 4200\times (40-20)\\\\=420000\ J\\\\=420\ kJ[/tex]

So, the heat energy required is 420 kJ.

write instruction to recharge mobile phone ​

Answers

1) Grab Charger
2) Plug Charger into wall outlet
3) grab your phone
4) grab cord connected to charger
5) plug end of cord into the charger port of your phone
6) wait for phone to charge

*phone will give you a notification when it’s charging and when done*

These are some instructions to recharge a mobile phone:

You need to have a phone charger.Connect your phone charger to your phone.Then connect it to the electricity.Wait for the mobile phone to charge fully.Disconnect your phone from the phone charger and the electricity.

How do you give instructions?

In this exercise, you have to give instructions to charge a mobile phone.

When you have to give instructions it is helpful to explain every action using a specific order so it is easier for the other person to understand the instructions.

Check more information about mobile phones here https://brainly.com/question/9447658

Which type(s) of license(s) allow the underlying software code to be viewed?

a. Freeware
b. Free software

Answers

Answer:

The correct answer is B. Free software.

Explanation:

Free software is a term used for software that the holder can use, copy, read, modify and distribute with or without modification at will. Software that falls under this category includes software that is not protected by copyright laws or software that is licensed to be used in this way.

Motives for developing free software can be technical, economic or social. What is significant for developers is the desire to develop as producers of programs by learning from other producers. The desire to help others is also a major motive.

Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array name b. The array size Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 8 Exercises | 593 c. The data type of each array component d. The range of values for the index of the array e. What are the indices of the first, middle, and the last elements

Answers

Answer:

Following are the solution to the given choices:

Explanation:

Given:

double currentBalance[91];//defining a double array  

In point a:  

The name of the array is= currentBalance.  

In point b:  

91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728

In point c:  

Each element's data type is double.

In point d:  

The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).  

In point e:  

To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]

Which file extension indicates a text document? .ppt .tst .pdf .txt

Answers

Answer:

The answer is .txt

Explanation:

Answer:

.txt

Explanation:

odesseyware 2021

Requests to retrieve data written in a language such as SQL are called…


A. Data
B.queries

Answers

B. Queries

Queries can be fairly broad or written to focus on time frames, types of data, ranges etc.

Where can a client identify the instant deposit options for their QuickBooks Payments account?

Deposits tab
Account and Settings
Invoices tab
Create Invoice screen
Banking Center

Answers

Answer:

Banking centre

.

.

..

.

.

.

.

.

.

.

After reading through the code, what will happen when you click run?​

Answers

Answer:

B.) Laurel will try to collect treasure when there is not any and it causes an error

Explanation:

Laurel is at the top right corner of the map. When you click run, laurel moves 1 step ahead. This spot is right above the coordinate of the very first diamond. There is no treasure at this spot.

Therefore, when the next command calls for collecting, there will be an error, as there is no treasure at the spot right above the first diamond.

Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page. Which
markup language or technology will allow Rosa to add this element?

OA. HTML
OB. Semantic HTML
OC. DHTML
OD. XML

Answers

The answer is: OC: DHTM
Explanation: PLATOLIVESMATTER

Answer:

The correct answer is C. DHTML.

Explanation:

I got it right on the Edmentum test.

what is output? x=-2 y=-3 print (x*y+2)

Answers

Answer:

=8

Aaaaaaaaaansjxjdjsaaaaaaa

Explanation:

-2*-3=6+2=8

Write a C++ program that tests whether the array has four consecutive numbers with the same values. bool isConsecutive(int values[], int size) In the main() program you should prompt the user to enter a series of integers and display if the series contains four consecutive numbers with the same value. Your program should first prompt the user for the number of integers in the list or number of values in the series. Assume the maximum array size is 20. No global variables may be used Use a function prototype for said function The function can not do any cin or cout The main() function will do all the cin and cout You may assume the list contains positive integers only Sample runs (bolded text is output) : Enter the number of values: 6 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 5 Enter a value: 5 Enter a value: 5 The list has consecutive four numbers! Enter the number of values: 9 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 50 Enter a value: 5 Enter a value: 6 Enter a value: 5 Enter a value: 5 Enter a value: 6 The list has no consecutive fours numbers!

Answers

Answer:

#include <iostream>

using namespace std;

bool isConsecutive(int values[], int size){

   bool r = false;

   int count=0;

   for(int i=0;i<size;i++){

       if(values[i]==values[i+1]){

           count++;

           if(count==3)

           r=true;

       }

       else{

           count=0;

       }

   }

   return r;

}

int main() {

   // Write C++ code here

   int size;

   

   cout<<"enter the number of integer in list"<<endl;

   cin>>size;

   int arr[size];

   for(int i=0;i<size;i++){

       cout<<"enter the value of number"<<endl;

       cin>>arr[i];

   }

  bool result= isConsecutive(arr,size);

  if(result){

      cout<<"The list has consecutive fours numbers!"<<endl;

  }

  else{

      cout<<"The list has no consecutive fours numbers!"<<endl;

  }

   return 0;

}

Explanation:

Above program is written in C++ language.

All bold-faced words and letters are C++ keywords.

write a technical term for following statements
1.The method applied to increase the life of computer and its assets.
2.The power regulating device this supplies constant power to the computer from its backup system.
3.The software used to scan, locate and detect the disk for viruses.

Answers

Answer:

1. Hardware Maintenance

2. Uninterrupted Power Supply (UPS)

3. Antivirus software

Explanation:

Antivirus software, or Anti-virus software (also known as AV software), otherwise called anti malware, is a PC program used to forestall, distinguish, and eliminate malware.

Antivirus software was initially evolved to identify and eliminate PC infections, thus the name. Be that as it may, with the expansion of different sorts of malware, antivirus software began to give security from other PC dangers. Specifically, current antivirus software can shield clients from: noxious program criminals.

A few items additionally incorporate security from other PC dangers, for example, tainted and noxious URLs, spam, trick and phishing assaults, online identity (privacy), web based financial assaults, social engineering techniques, advanced persistent threat (APT).

Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the Web serving application than the original processor. Assuming that the original processor is busy with computation 40% of the time and is waiting for I/O 60% of the time, what is the overall speedup gained by incorporating the enhancement

Answers

Answer:

The overall speedup gained by incorporating the enhancement is 1.563

Explanation:

Using Amdahl's Law;

The overall speedup  [tex](N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}[/tex]

where;

P = Fraction Enhanced for Old Processor

n = speedup enhancement as a result of the new processor

P = 40% = 0.40  and n = 10

The overall speedup (N) is:

[tex]=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}[/tex]

[tex]=\dfrac{1}{(0.6) + ( 0.04)}[/tex]

[tex]=\dfrac{1}{0.64}[/tex]

= 1.563

Thus, the overall speedup gained by incorporating the enhancement is 1.563

Explain the concept of Informed Consent?

Answers

Informed consent is a process of communication between you and your health care provider that often leads to agreement or permission for care, treatment, or services. Evey patient has the right to get information and ask questions before procedures and treatments.

What is Memory Card? Explain?​

Answers

A memory card is basically a card that holds memory. The card can be removed at anytime and put into any other device. It is mainly used for extra storage and to transport videos, pictures, etc. to other devices

Hope this helps.   : )

y'+2y = 5-e^(-4x), y(0)=-11

Use Euler's Method with a step size of h = 0.1 to find approximate values of the solution as x= 0.1, 0.2, 0.3, 0.4, and 0.5. Compare them to the exact values of the solution at these points.

Answers

Answer:

  see attached

Explanation:

A differential equation solver says the exact solution is ...

  y = 5/2 -14e^(-2x) +1/2e^(-4x)

The y-values computed by Euler's method will be ...

  y = ∆x·y' = 0.1(5 - e^(-4x) -2y)

The attached table performs these computations and compares the result. The "difference" is the approximate value minus the exact value. (When the step size is decreased by a factor of 10, the difference over the same interval is decreased by about that same factor.)

(20 points). Some matrixes have very special patterns, for example, in the following matrix, the numbers in the first row are equal to the number of their respective column; the numbers in the first column are equal to the square of the number of their respective row; when the row number equals to the column number, the elements are equal to 1; the rest elements are the sum of the element just above them and the one to their left. Write a user-defined function program in the program, you need to use while loops), and then use the function you write to create the following matrix (show the command you use). 1 4 9 16 2 1 10 26 3 4 1 27 4 5 8 13 9 22 1 23

Answers

Answer:

#include <iostream>

using namespace std;

void matrix(){

   int row = 5, col = 6;

   int myarr[row][col];

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           if (i == 0){

               myarr[i][x] = (x+1)*(x+1);

          }else if ( x == 0){

               myarr[i][x] = (i+1)*(i+1)*(i+1);

           } else if ( i == x){

                myarr[i][x] = (i+1);

           } else{

                myarr[i][x] = myarr[i-1][x] + myarr[i][x-1];

           }

        }

   }

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           cout<< myarr[i][x] << " ";

       }

       cout<< "\n";

}

}

int main(){

   matrix();

}

Explanation:

The C++ source code defines a two-dimensional array that has a fixed row and column length. The array is a local variable of the function "matrix" and the void function is called in the main program to output the items of the array.

What will be result of below if statement.
if (Grade >= 90)
puts("A");

What’s the answer?

Answers

Explanation:

pls check it ur answer hp u understand this

The cost of a postsecondary education increases with the length of time involved in the program.


True

False

Answers

False it stays the same hope this helps :)

What are differences between manual formatting and formatting in word
processor?​

Answers

Answer:-

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers,copy and paste or undo redo features. Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

Please!! I need help, this is due by tonight!!!

Answers

Answer:

sorry if it is too late but I think it is d

Explanation:

what command in cisco IOS allows the user to see the routing table

Answers

Answer:

Show IP route command

Explanation:

A hacker posing as a potential customer has connected to your network and has discovered that a server running Windows Server has a configuration that a misconfiguration on a Windows Server that exposes the PowerShell prompt. The hacker executes a script to log valuable information about the server. Which vulnerabilities did the hacker exploit

Answers

Answer:

Lack of ips

Insecure configuration

Explanation:

Lack of IPS

This is fully known as intrusion prevention softwares this works by enabling the firewall and protecting the computer system from unauthorised users and potential attackers and it prevents data from being stolen by identifying potential attacks. It monitors the network continuously, thereby looking for possible malicious threats and also capturing informations about these threats.

Insecure configuration

Obviously if you have power shell enabled then you would have a secure configuration. Attackers can easily access your system in the presence of this flaw.

Write a program that declares a two-dimensional array named myFancyArray of the type double. Initialize the array to the following values: 23 14.12 17 85.99 6.06 13 1100 0 36.36 90.09 3.145 5.4 1. Create a function that will return the sum of all elements in the array. Call this function from main and print out the result. 2. Create a function that will use a nested loop to display all the elements in the array to the screen. Call this function from main.

Answers

Answer:

This solution is provided in C++

#include <iostream>

using namespace std;

double sumFancyArray(double myarr[][6]){

   double sum = 0.0;

   for(int i = 0;i<2;i++)    {

       for(int j = 0;j<6;j++){

       sum+=myarr[i][j];    

       }}    

   return sum;

}

void printFancyArray(double myarr[][6]){

   for(int i = 0;i<2;i++)    {

       for(int j = 0;j<6;j++){

       cout<<myarr[i][j]<<" ";    

       }

   }

}

int main(){

   double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};

   cout<<sumFancyArray(myFancyArray)<<endl;

   printFancyArray(myFancyArray);

   

   return 0;

}

Explanation:

This function returns the sum of the array elements

double sumFancyArray(double myarr[][6]){

This initializes sum to 0

   double sum = 0.0;

This iterates through the row of the array

   for(int i = 0;i<2;i++)    {

This iterates through the column

       for(int j = 0;j<6;j++){

This adds each element

       sum+=myarr[i][j];    

       }}    

This returns the sum

   return sum;

}

This method prints array elements

void printFancyArray(double myarr[][6]){

This iterates through the row of the array

   for(int i = 0;i<2;i++)    {

This iterates through the column

       for(int j = 0;j<6;j++){

This prints each array element

       cout<<myarr[i][j]<<" ";    

       }

   }

}

The main starts here

int main(){

This declares and initializes the array

   double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};

This calls the function  that returns the sum

 cout<<sumFancyArray(myFancyArray)<<endl;

This calls the function that prints the array elements

   printFancyArray(myFancyArray);

   

   return 0;

}

Use the drop-down menus to select the software term being described. The is what the user interacts with when operating a computer. The is the most important computer software. The is the software located within the hardware.

Answers

Answer:

1.)  A. application software

2.) C. operating system

3.) B. basic input/output system

Answer:

All of his are correct :)

Explanation:


A browser is an example of a. :
general-purpose application
specialized
program
system application
utility program​

Answers

a browser is an example of a system application

You have been asked to write a program that involves animals. Some animals are herbivores. Within this program, any animal that is not a herbivore is a carnivore. Which set of class definitions is most appropriate for this program

Answers

Incomplete question. The options:

class Animal :

class Herbivore(Animal):

class Carnivore(Herbivore) :

class Animal (Herbivore, Carnivore) :

class Herbivore :

class Carnivore

class Animal

class Herbivore (Animal) :

class Carnivore (Animal) :

class Animal:

class Carnivore (Animal) :

class Herbivore (Carnivore) :

Answer:

class Animal

class Herbivore (Animal) :

class Carnivore (Animal) :

Add a clause for identifying the sibling relationship. The predicate on the left handside of the rule should be sibling(X, Y), such that sibling(alice, edward) should be true, and X, Y do not need to be different.

Answers

Answer:

following are the solution to this question:

Explanation:

For Siblings (X,Y);

Alice(X),

Edward(Y),

parent(Edward,Victoria,Albert) //Albert is the father F

parent(Alice,Victoria,Albert)  //Victoria is the Mother M

Therefore,

X is siblings of Y when;

X is the mother M and father is F, and  Y is the same mother and father as X does, and satisfing the given condition.

It can be written as the following prolog rule:

Siblings_of(X,Y):

parents(X,M,F)

parents(Y,M,F)

Siblings_of(X,Y): parents(X,M,F), parents(Y,M,F)

|? - sibling_of(alice,edward).

yes

|? - Sibling_of(alice,X).

X=Edward

|? - Sibling_of(alice,alice).

yes

what command in cisco IOS allows the user to see the routing table

Answers

Answer:

show ip route [[ipAddress [mask]] [bgp | connected | mpls [ipAddress] [ipAddress/PrefLen] [ipAddress mask] [detail] | isis | ospf | static | summary | multicast |unicast]

Explanation:

the show ip route command will show the entire ip route table.  If you put in no arguments it will display them all.

Write a java program to read an array of positive numbers. The program should find the difference between the alternate numbers in the array and find the index position of the smallest element with largest difference. If more than one pair has the same largest difference consider the first occurrence.

Answers

Answer:

int s;

int[] num= new int[s];

Scanner sc = new Scanner(System.in);

System.out.printIn("Enter array size");

size = sc.nextInt();

for (i = 0; i < s; i++){

   num[i] = sc.nextInt();

}

int[] difference;

int count = 0;

for (i = 0; i < num.length(); i= i + 2){

   if (num[i] > num[i+1]){

       difference[count] = num[i] -num[i+1];

   }else{

       difference = num[i+1] - num[i];

   }

}

int max = 0;

for (int i : difference) {

   if ( i > max){

       max = i;

   }

}

int result = Arrays.stream(difference).boxed().collect(Collectors.toList().indexOf(max);

System.out.printIn(result);

Explanation:

The Java source code uses procedural method to execute a task. The program prompts for user inputs for the array size and the items in the array. Assuming the array has an even length, the adjacent items of the array are subtracted and stored in another array called difference. The index of the maximum value of the difference array is printed on screen.

Other Questions
Solve the linear system using a table.7a -b=-1-4a - 2b = -2A. (0,0)B. (0,1)C. (1,0)D. (1,1) Need help with these following questions PLEASE HELP ME 1) If a bus travelling at 20 m/s is subject to a steady deceleration of 5 m/s2, how long will ittake to come to rest? January 19 national popcorn day. A bag of popcorn has the average of 450 kennels if 4%% of the kernels dont pop how manu pieces of popcorn will the bag make A time of "Roman Peace" that allowed many technological developments in the Roman Empire.A. PolytheisticB. republicC. SenatorsD. Pax Romana Read the sentence and choose the option with the correct number which matches the sentence. El silln cuesta novecientos dlares. A. 900 B. 9.000 C. 500 D. 5.000 Jordan is another employee at the same coffee shop. He has worked there longer than Gabe and earns 3 more per hour than Gabe. How much money will he earn after the following hours: 4, 8 ,12 and 16 PLZ HELP I DON'T UNDERSTAND!! a boy is playing catch with his friend. He throws the ball straight up. When it leaves his hand, the ball (2kg) is traveling 10m/s. Whats the ball's kinetic energy just as it leaves the boy's hand? What is the potential energy of the ball when it reaches the highest point? Find Mack's debt-to-income ratio if his monthly expenses are $2850 and his monthly salary is $4000Pls help mee Will give brain if u show a little bit of work !!!! Question 2 (1 point)The diagrams below represent your leg. The top of the diagram represents the hip. The bottom of thediagram represents the foot. Which diagram shows the muscle that straightens out your knee?(A)(B)(C)(D)bbCOcOdd PLS HELP ME 30 POINTSWhich angles are coterminal with 78?Select EACH correct answer.9/825/823/89/8 What are the two major sources for the practices of the Elizabethan stage? HELP PLEASE EXPERTS! the question is in the picture How does earth's position in space affect water on earth? One way in which the Sepoy Mutiny in India, the Zulu resistance in southern Africa, and the Boxer Rebellion in China are similar is that each resulted from1.government policies of ethnic cleansing2.attempts by democratic forces to overthrow the monarchy3.native reaction to foreign interference in the region4.government denial of access to fertile farmland Find the coefficient of x in the expansion of (x - 2/x) If you answer correctly I will give you brainlest GOES TO THE FIRST PERSON WHO ANSWERS CORRECTLY! What was one of the primary goals of the Pan-African Movement in the twentieth century? can someone please help explain this to me? ill give brainliest Beginning balance of capital Rs. 40,000 and liabilities Rs. 10,000. Accounting equation