A company's website needs to be more highly available and faster for users to access outside of their country. Which action can they take to achieve this?

Answers

Answer 1
The company could use multiple versions of the website hosted on different servers on other countries alongside with using different domain endings.

Related Questions

Why does a computer need primary and secondary memory ?

Answers

Primary memory are generally faster but costlier
And secondary memory are slower but cheaper
You need a combination of both
So need most frequently used apps in your primary memory and least ones like videos photos images in secondary

some critics aruge that excessive media consumption can encourage______.
A. deeper reading
B. taking breaks from using digital media
C an unhealthy lifestyle
D. healthy friendships

Answers

c. an unhealthy lifestyle

Which statements describe the use of sound in presentations?

Sound cannot be used in presentation programs.
Sound can distract the audience when it is overused.
Sound can only be used with transitions.
Sound can only be used with animations.
Sound can be used with both animations and transitions.

Answers

Answer:

b and e

Explanation:

The statements that best describe the use of sounds in the presentation are as follows:

Sound can distract the audience when it is overused.Sound can be used with both animations and transitions.

Thus, the correct options for this question are B and E.

What do you mean by Presentation?

The Presentation may be defined as the type of process through which an individual who is known as the speaker conveys information on a particular topic to the number of people known as the audience.

As normally sound makes the presentation more attractive and understandable but the excess sound in the presentation makes the mood of the audience saturated and finally distracts. A standard level of sound must be required in both animations and transitions to make the presentation more influencing one.

Therefore, the correct options for this question are B and E.

To learn more about the Advantages of presentations, refer to the link:

https://brainly.com/question/11972945

#SPJ2

Consider the following numeric values.

Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?

Answers

Answer:

d 5, b 1011, d 12, b 1101

Explanation:

If you convert the binary, 1011 is 11 and 1011 is 13.

The ordered list of values from least to greatest is Decimal 5, Binary 1011, Decimal 12, and Binary 1101.

Binary refers to the numbers consisting of only "0" (zero) and "1" (one), while decimals are digits from "0" to "9".

In computation, binary numbers are used in order to store any type of data, these numbers consist of binary digits (bits).

A sequence of binary numbers must be read in a digit-by-digit manner, conversely to decimal numbers, which are read by ten, hundred, etc.

The decimal numbers can be estimated as the sum of the binary numbers times their power of 2 (2n).

In conclusion, the ordered list of values from least to greatest is Decimal 5, Binary 1011, Decimal 12, and Binary 1101.

Learn more in:

https://brainly.com/question/16612919

HERES A RIDDLE!!

What is more useful when it’s broken??

Answers

Answer:

an egg

Explanation:

1. What is JavaScript?
2. Who designed the Apple 1 Computer?
3. Who founded Apple?

Help me, it would be a pleasure if you could.

Answers

Answer:

1. JavaScript is a dynamic computer language used to primarily code and create system functions.

2. The people who designed the Apple 1 Computer were

Steve WozniakSteve Jobs

3. The founder of Apple was Steve Jobs. He passed away from pancreatic cancer.

Hope this helps you!

Which Call of Duty game is the best?
A. Black Ops 1-4
B. Modern Warfare 1-4
C. Infinite Warfare
D. Advanced Warfare
E. Ghosts
F. WWII

Answers

Answer:

i like ghost and modern 3

Explanation:

You are planning a program to find the maximum heart rate recommended for patrons of a gym where you have a part-time job. One formula for calculating
the maximum heart rate is the difference between 220 and the patron's age.
You are testing for accuracy.
If a patron is 15 years old, what is the maximum heart rate?

Answers

The program would look like:

age = int(input("What's your age? "))

print(f"Your maximum heart rate is {220 - age}.")

If we input 15 as the age, the maximum heart rate is 220 - 15, which equals 205

The maximal heart rate is 220 minus 15, which is 205 if we enter 15 as the age.

What is meant by patrons?

A patron is a special guardian, protector, or supporter of the arts as defined in definition. A wealthy or influential ally of an artist.

A patron is someone who frequently uses a business's services or makes financial contributions to another person or cause, such as an arts patron. A customer is someone who goes to the same restaurant every week, for instance.

Formal someone who often visits a particular restaurant, hotel, or other business. This parking lot is for customers only. synonyms and comparable words. a stay in a hotel or guesthouse. Bookable.

The word patron comes from the Latin pater or patr- meaning "father." Think of how a father is supposed to financially support his kids. A patron of the arts is someone who shows his appreciation or support for the arts by donating money to arts organizations.

Thus, The maximal heart rate is 220 minus 15,

For more details about patrons, click here:

https://brainly.com/question/16783674

#SPJ5

all of the following are examples of service learning opportunities exept

Answers

Answer:

give following examples please

someone uses instant messaging on a social media website to talk to her friends.give two advantages of using social media​

Answers

Answer:

Social media can be used to gain informationTo communicate with people far awaySocial media can help in broadcasting a bussiness .

What is the output of this program? numA = 10 for count in range(5): numA = numA + 2 print (numA)​

Answers

Answer:

20

it runs the code 5 times, 10+2+2+2+2+2 basically. E.g 20

Answer: 20

Explanation: got  it right on edgen

Which of the following BEST describes the differences between sequential and event-driven programming?

Answers

Answer:

In sequential programming, commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.

Explanation:

Event-driven program : A program designed to run blocks of code or functions in response to specified events.

Sequential programming: The order that commands are executed by a computer, allows us to carry out tasks that have multiple steps. In programming, sequence is a basic algorithm: A set of logical steps carried out in order.

The missing options are;

A) In sequential programming commands run one at a time. In event-driven programming all commands run at the same time.

B) In sequential programming commands run faster than in event-driven programming.

C) In sequential programming each command is run many times in sequence. In event-driven programming all commands are run a single time as an event.

D) In sequential programming commands run in the order they are written. In event-driven programming some commands run in response to user interactions or other events.

This question is about sequential programming and event-driven programming.

Option D is correct.

To answer this question, we need to first of all define what the two terminologies in computer programming are;

Event-driven programming; This is a programming pattern whereby the program flow is determined by a sequence of events that arise from activities/interaction of the user or the system.

Sequential programming: This is a programming pattern whereby the program flow is determined by the sequence in which it was written.

Looking at the given options, the only one that fits perfectly into the description I have given above about sequential and event-driven programming is Option D.

Read more at; brainly.com/question/17970226

Does anyone know how to ask the user to input their name and then print the name 10 times using a while loop and have the 10 names on different lines?

Answers

In python:

name = input("What's your name? ")

i = 0

while i <= 10:

   print (name)

   i += 1

I hope this helps!

Henry wants to create a website for his projects. He needs it to have a lot of textual content, proper formatting, and animations. Which languages will he need for this?

Henry can us ____to create the web content. He can use ____ to style the content he has created and _____ to create animation

the blank choices can be filled with
1.CSS HTML XML
2.CSS XML DHTML
3. Javascript Shockwave ActionScript ​

Answers

Answer:

1. HTML

2. CSS

3. JavaScript

Explanation:

Shockwave and Actionscript are no longer used on the web.

The Answer Above is incorrect. This is the correct answer:

What keyword do we use to tell Java to set aside memory to create an object?

Answers

Answer: You reserve memory locations for an array when you _____.

use the keyword new

In java, keywords are special words, that have reserved meaning; and they cannot be used for any other purpose apart from their predefined functions.

The keyword to set aside memory for objects is the new keyword.

The following syntax is used to create an object in java;

Object object_name = new Object();

Take for instance, you want to create a Scanner object.

We use the following:

Scanner scnr = new Scanner(System.in);

The new keyword will always be present when creating objects, in other to create the instance of the object, and allocate memory for the object that is being created.

Read more about java keywords at:

https://brainly.com/question/22082613

Use the drop-down menus to complete statements about importance and sensitivity levels. The Low Importance level is rarely used, and the High Importance level should be used . The sensitivity levels are personal, private, and . Sensitivity levels are basically only , as they appear on the Info Bar in the message.

Answers

Answer:

first blank- cautiously

second blank- confidential

third blank- informational

Explanation:

i got it correct on edge 2020

The Low Importance level is rarely used, and the High Importance level should be used cautiously.

What is cybersecurity?

Cybersecurity can be defined as a preventive practice that involves the protection of computers, networks, software programs, servers and data (information) from unauthorized access, potential theft, attack, or damage, especially by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, the use of the various security levels include:

The sensitivity levels are personal, private, and confidential. Sensitivity levels are basically only informational, as they appear on the Info Bar in the message.

Read more on Cybersecurity here: https://brainly.com/question/14286078

#SPJ2

people with healthy media diets:
A.do not have problems with addictions, obesity, or other health issues
B. make good choices about what media to use and when not to use them
C. do not eat while engaging in media and avoid unnecessary weight gain
D. choose to leave media and technology out of their lives entirely

Answers

Answer:

b

Explanation:

HOW MEANY PEOPLE PLAY AMONG US

Answers

Answer:

up to 1.5 million people are playing Amoung Us

Explanation:

Answer: I Play Among Us But this is a website for learning and questions so please ask that somewhere else. Thank You Have A Nice Day!

Explanation:

Does anyone know how to use a while loop and ask a user to input positive integers until the user enters 0 and print the sum so far after each input, then print final sum at the end in edhesive?

Answers

In python:

total = 0

while True:

   num = int(input("Enter a number: "))

   if num == 0:

       break

   total += num

print(f"The final sum is {total}")

what is marc railberts goal for the robots his company (Boston Dynamics) builds?

Answers

Answer:

. We wanted to build a robot that could go where people go

Explanation:

Which term refers to a fact that naturally occurs in the universe?
A.
scientific law
B.
scientific inquiry
C.
conclusion
D.
hypothesis

Answers

Answer: a scientific law

Explanation:

It’s A.Scientific law

para saan po yung points dito?

Answers

Answer:

Hindi kudin Alam eh hahahha

Answer:

Hey, there this is the answer

Users need to use points to post a question. The more points they use, the more quickly their question will be answered. Users gain a basic number of points each time they log into the platform.

Which e-mail netiquette rules did the student break? Check all that apply.

Answers

Answer: B, D, and E in other words 2, 4, and 5

Answer:a b e

Explanation:

the other person is wrong

13. Microsoft PowerPoint is the best example of Multimedia Presentation
Software.
OFalse
True​

Answers

Answer:

Uhhh...ooop.........

I’m pretty sure it is either falsely true or truly false

Film directors generally earn more money than theater directors. True False

Answers

Yes, it’s true they earn more. Film directors earn between $250,000 to 2 million per project. New directors typically earn between $250,000 to $500,000 per film, while film directors earn about $1 million per movie.
Theatre directors in the UK earn on average £10,759 a year from their craft- well below the £27,000 take home annual salary national average- with some directing jobs paying less than £1 an hour, new research has revealed.

Answer:

Yes, it's true on edge 2022.

What is an enterprise system

Answers

Answer:

Explanation:

Enterprise system is a cross- functional information system that provides organization-wide coordination and integration of the key business processes. Enterprise system helps in planning the resources of an organization.

Employment of web developers is projected to grow _________ From 2019 to 2029, much faster than the average for all occupations.
A)10%
B)5%
C)20%
D)8%
E)12%​

Answers

Answer:

E

Explanation:

The demand for web developers are projected to grow to such a size because of the worlds expected connection to the internet will need web developers to accomadate.

Jennifer works as a programmer. She has fixed certain bits of code in a program while developing it. She has purposely left specific code in the program so she can access the program later and obtain confidential information. Which programming threat has she created?
A. logic bomb
B. trap door
C. Trojan horse
D. virus

Answers

Answer:

B. trap door

Explanation:

It's also referred to as the back door

HELP HELP BRAINLIEST A student learns that a classmate is being cyberbullied. He wonders if it is a serious situation and how it is affecting his classmate.

What areas of his classmate’s life may be impacted by cyberbullying? Check all that apply.

physical health
recent memories
school performance
emotional health
athletic ability

Answers

Answer:

physical health

school performance

emotional health

Why is file extension important when naming the file

Answers

Answer:

Extensions are important because they tell your computer what icon to use for the file and what application can open the file

Explanation:  For example, the doc extension tells your computer that the file is a Microsoft Word file.

Other Questions
The perimeter of rectangle is 36 the length is 3 more than two times the width In what three ways did globalization affect Americans in the 1990s?It resulted in foreign investment opportunities for entrepreneurs.It increased the gap between wealthy and poor individuals.It allowed Americans to buy foreign goods at cheaper prices.It reduced the variety and selection of foreign goods in the United States.It raised concerns that Americans might lose their jobs to foreign workers. Susan and Joe push a table 18 meters down a hall by exerting a force of 200newtons What is the total amount of work done on the table GIVING BRAINLEST TO WHOEVER ANSWERS FIRST!!!!!!!!!!!!Which two methods can be used to solve the equation 5/7 n = 8 3/5 ?Group of answer choicesMultiply both sides by 5/7 or divide both sides by 7/5.Divide both sides by 5/7 or multiply both sides by 7/5.Add 5/7 to both sides or subtract 7/5 from both sides.Subtract 5/7 to both sides or add 7/5 to both sides. Question 1 of 10The was developed as a result of the Securities Act and SecuritiesExchange Act.A. Federal Reserve BankB. Federal Deposit Insurance CorporationC. Securities and Exchange CommissionD. Securities and Exchange Center of AmericaSUBMIT ILL GIVE BRAINLY THINGYour class raised funds for an end of the year trip to an amusement park. It costs $150.00 to rent a school bus for the day plus $33.00 per student admission ticket. If your class raised $1000.00, how many students can attend? Write an equation and solve 1 5/6 * 2 * 3/4 + 1 5/6 * 1 * 3/4 A kite is inscribed within a square with a side lengths of 9 units. A kite is inscribed in a square with a side length of 9 units. What is the area of the kite? 27. 5 square units 36. 0 square units 40. 5 square units 45. 0 square units. plss someone help my do this problem (a^14 a^-6 / a^25)^3 find the size of unknown anglese) 100+a please help thank you AP PsychologyWhen Bob noticed a pain in his thigh, he was convinced it was a sign of bone cancer. Although x-rays revealed no sign of cancer, Bob sought the opinions of a dozen other physicians who agreed with the original opinion. What psychological disorder might Bob's behavior indicate? Conversion disorder Major depressive disorder Catatonic schizophrenia Illness anxiety disorder Depersonalization disorder Diego pays $4.50 for 3 pounds of bananas and 2 pounds of oranges. One pound of oranges cost $0.75 more than one pound of bananas let b represent the price per pound of bananas. Which equation represents the situation, and what is the price per pound of each fruit? solve pls brainliest If the area of a triangle is 100 in^2, and the height is 10in, find the length of the base in inches.Round to the nearest inch if applicable. Where is water stored?in a aquiferin a sewerin the atmosphere (All of the above) Baby Max watches his mother jingle her keys in front of him. After several minutes, he looks away, no longer interested. This would indicate that he is habituated to the jingling keys and is showing _____ the stimulus after repeated presentations. Benny has 20 jellybeans and wants to share with his friends how many will each friend get? there are 5 friends. Which are ways cybercriminals act? Select 3 options.log keystrokes of other usersdestroy informationsell usernames and passwordsshare open-source softwarecorrect social injustice QuestioEvaluate the given expression if a = -2 and b = 5.a3 + b2. 71. 17. 21. -17