Which of the following statements is true regarding the technical issues for developing applications for global audiences? Select 3 options.

Content delivery networks prevent traffic surges and can offset slow local internet service.

You should base your choice of which operating system to develop on usage rates in that specific market

Most users now have stable, fast connections worldwide.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

Answers

Answer 1

Answer:

Explanation:

From the available options presented, when developing for a global audience the following are true...

Content delivery networks prevent traffic surges and can offset slow local internet service.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

For global applications content delivery networks are a must since they allow the end-user to access the web page and its high quality content as if the web server were close by. By reducing the distance between the server and the end-user through these networks, you are effectively reducing latency, load times, performance, traffic surge effects, etc. Also when developing for a worldwide audience you should limit the number of larger images and audio files to only show the necessary ones for each target region, in order to make performance much more stable.


Related Questions

What is the output of this program?

grades = [89, 70, 98, 100, 83]

print(grades[-4])

Group of answer choices

89

100

70

98

Answers

Answer:

70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer

What is a bounding box

Answers

Answer:

bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.

Plz help:(!!!!

Type the correct answer in the box. Spell all words correctly.

Claire wants to use a filter to ensure quality in the software development process and product. What can Claire use for this purpose?

Claire should use_________
as a filter to ensure quality in the software development process and product.

Answers

Answer:

Defect filters

Explanation:

Answer:

"a quality gate" is the correct answer :D

Explanation:

Readable code includes the use of
color and symbols to make the code look good.
consistent and meaningful variable names, helpful comments, and formatting.
variable names that do not vary from program to program.
comments that include the programmers' reactions to a particular piece of code used.

Answers

Answer:

bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB

Explanation:

The Readable code includes the use of color and symbols to make the code look good is; A consistent and meaningful variable names, helpful comments, and formatting.

Since Readable code is crucial for software development. It makes it easier for programmers to understand, modify, and maintain the code. It is well-organized, with consistent and meaningful variable names, helpful comments, and proper formatting.

Using consistent and meaningful variable names allows programmers to easily understand what the variable represents.

Helpful comments also play a crucial role in making the code readable. Comments should be used to explain, the code is doing, why it is doing it, and any other important details that would help programmers understand the code.

Formatting is also essential in making the code readable.

In summary, readable code includes consistent and meaningful variable names, helpful comments, and proper formatting.

Learn more about the code here;

https://brainly.com/question/14278291

#SPJ4

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app.

Answers

A. She has a home network with smart home devices

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. Friend is able to do this by  doing home network with smart home devices. The correct option is a.

What are smart devices?

The devices which are operated using the analog signals which carry information.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone.

Friend is able to do this by doing home network with smart home devices.

Thus, the correct option is a.

Learn more about smart devices.

https://brainly.com/question/17509298

#SPJ2

What defines employability

Answers

is this multiple choice or are you looking for the definition?

Who has gotten a random file link from someone? What file does it contain?

Answers

Answer:

those are bots , just report those

Explanation:

I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it

just need to know if these are correct

Answers

Answer:

Yes, they are correct.

Answer:yea g

Explanation:

one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..​

Answers

Explanation:

you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.

hope it helps ( brainleist please )

.....is used to save project in Visual basic .net from file menu

Answers

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?

A small computer on a smart card has 4 page frames. At the first clock tick, the R bits are 1000 (page 0 is 1 and the rest are 0). At subsequent ticks, the values are 0110, 0101, 1010, 1101, 0101, 0011, and 1100. If the aging algorithm is used with a 16-bit counter, give the values of the four counters after the last tick. If page fault occurs, which page should be swapped out

Answers

Answer and Explanation:

Aging algorithm Aging algorithms are the NFU algorithm with modification to know the time of span and increment the page referenced. The ageing method sort customer invoices by date in four columns. By using the ageing algorithm, counters are shifted by 1 bit, and the R bit is added to the leftmost bit. The values of counters are

Page 0:  01101110

Page 1:   01001001

Page 2:  00110111

Page 3:  10001011

The system clock is 2ns and interval is 2ms for that one bit per interval is the ability to analyze the references in a tick. Counters have a finite number and have two pages, where counter value 0 have two pages. The page fault appears, and pick just one of them randomly.

What would you classify anti-malware software as?


SaaS

enterprising

cloud

security

Answers

Answer:

enterpriseing is the answer

Which of the following belongs in a website citation? (select all that apply)

the place where the author works

the Internet address or web page address

the person or organization responsible for the website

page numbers

the date when you got the information

Answers

The place where the author works I think

Answer:

the Internet address or web page address

the person or organization responsible for the website

the date when you got the information

Explanation:

Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.


kinetoscope

selenium

cotton

celluloid

Answers

The answer: Kinetoscope

Answer:

Celluloid

Explanation:

It is Sis

who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!

Answers

Explanation:

Lyrics

It's raining tacos

From out of the sky

Tacos

No need to ask why

Just open your mouth and close your eyes

It's raining tacos

It's raining tacos

Out in the street

Tacos

All you can eat

Lettuce and shells

Cheese and meat

It's raining tacos

Yum, yum, yum, yum, yumidy yum

It's like a dream

Yum, yum, yum, yum, yumidy yum

Bring your sour cream

Shell

Meat

Lettuce

Cheese

Shell

Meat

Lettuce

Cheese

Shell

Meat

Cheese, cheese, cheese, cheese, cheese

It's raining tacos

Raining tacos

Raining tacos

It's raining tacos

It's raining tacos

Raining tacos

Raining tacos

Shells, meat, lettuce, cheese

It's raining tacos

It's raining tacos

Answer:

Explanation:

is that even a real song??

btw i answered so the other guy can get brainlest annnnnnd bc i want the point LOL

PLEASE HELP! Please dont answer if your going to guess
You have three modes for opening a file. You wish to create a new file and write data to

the file. What letter belongs in this line of code?

myFile = open("another.txt", "_____")
r
w
a
d

Answers

Answer:

r

Explanation:

I literally learned this today when trying to make a python server with an html file:)

Answer:

w

Explanation:

Telecommunications, outsourcing, flextime, teamwork, and diversity are workplace trends adopted to
O True
O False

Answers

Answer:

False

Explanation:

Outsourcing and telecommuting are the trends related to presence of growing technology within the economy allowing various services to be outsourced to people who are more of an expert when it comes to handling those procedures.

write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and body will contain the name of the author satyajit ray ​

Answers

Answer:

Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.

Ray during recording of his film Pather Panchali

Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.

You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a database server. The new server has five hard disks, all with equal capacity. Your storage solution should meet the following requirements: System files should be on a volume separate from data files. All volumes should be protected so that the server can continue to run in the event of a failure of one of the disks. The data volume should be optimized for improved disk access times. You will use Windows Disk Management to create and manage the volumes. What should you do

Answers

Answer:

Explanation:

The best solution for this scenario would be to first create a mirrored volume for the system volume using two of the available disks and then a single RAID 5 volume with the remaining 3 disks for the data volume. This setup will allow all of the data to be backed up so that if one of the disks fails the server will continue running accordingly. The RAID 5 volume offers error checking and redundancy for the data, therefore, allowing the data to be accessed quickly and efficiently with far greater security and far less chance of data becoming corrupt.

4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference

Answers

Answer:

A. interview

Explanation:

1. why is manufacturing considered the biggest contributor to progress

Answers

Answer:

A vibrant manufacturing base leads to more research and development, innovation, productivity, exports, and middle-class jobs. Manufacturing helps raise living standards more than any other sector. Manufacturing generates more economic activity than other sectors.

Functions of file in computer ​

Answers

[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]

File in computers are used to store data, information and commands.

Thanks hope it helps.Pls mark as brainliest.

Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.

Answers

Answer:

A

Explanation:

The cell is intersection of column and row. true or false

Answers

Answer:

True

Explanation:

where a row and column meet. Columns are identified by letters (A, B, C), while rows are identified by numbers (1, 2, 3). Each cell has its own name—or cell address—based on its column and row

~Hope this helps

Answer:

True

Explanation:

PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

This is called an Arbiter!

Explanation:

A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.

True or False

Operating systems control the loading of software applications onto a computer

All OSs offer user preferences allowing you to customize your computer

Answers

I used this from a other.

False

Software is the collection of large program or instruction of codes, which is used to perform some task. It is of two types of system software and application software.

The system software is used as a container for the application software and it is used to handle all other software it is used to operate the system.

Application software is used to perform any operation. This type of software can be used by the user if it is installed on the local machine on any system software

The operating system is also the part of the system software because it is used to operate the system and it is also the soul of the computer system which is also the function of the system software but the above question states that the operating system is not the part of the system software which is not correct. Hence false is the correct answer to the above question.

Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself

Answers

Answer:

A how I feel about myself

Explanation:

Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.

which of the following is another term for a subfolder​

Answers

Answer:

below

Explanation:

subdirectory

Explanation:

Subdirectory is the another name of sub folderwhich is the small folder of files created withing a main folder.

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

Anyone else like hunter x hunter?
lets talk abt it uwu

good day :)

Answers

Answer:

mid

Explanation:

The correct answer is mid please give me brainlest let me know if it’s correct or not okay thanks bye
Other Questions
Im confused about this question Extra points!!. What percentage of the data values are greater than 78? Amelia has a 1-6 number cube (dice). She rolls the cube twice. What is the probability that she rolls two evennumbers in a row? Why Are Some Deadly Attacks Considered Terrorism, But NotOthers Are Not? Some therapists take a(n) ________ approach to psychotherapy, which means they draw on numerous techniques in their work with clients.a cognitiveb behavioralc psychodynamicd eclectic The fossil presence of anatomically modern humans in ________ demonstrates that our ancestors were capable of substantial water crossings by 40,000 years ago. BRAINIEST TO WHOEVER RIGHT Choisissez la bonne forme du pass compos pour complter la phrase.VNous avelingtlphoni nos parents hier soir.asavezontavonsala Linh needs 24 days to finish a task. Huy and Linh need 6 days to complete a task if they work together. How many days does Huy need to finish the task by himself? Write the answer?? ASAP PLSSSS How do I solve this problem? How many grams are in 4.00 moles of glucose, C6H120 Is a triangle with the side lengths 4 feet, 7.5 feet, and 8.5 feet a right triangle? Why or why not? solve the system: 3x-2y=1 2x+5y=3a.) x=1, y=1b.)x=-1,y=-1c.)x=11/19, y= 7/19d.)x=-19/2,y=22/5e.)x=17/3, y=8 What specific groups of people were targeted by the Nazis during the Holocaust? Help me with this please One third of the tomatoes in a garden are ripe. If 6 tomatoes are ripe, which equation can be used to find the total number of tomatoes in the garden? important question need help Can someone help me with this Can someone please help me with this (it says I have to choose more than 1 answers) What Happened with Chernobyl 2 sentences