Question 1
A URL is a ____-part addressing scheme
a. |
two |
|
b. |
four |
|
c. |
three |
|
d. |
one |
Question 2
A text file that contains HTML tags is called a(n) ____.
a. |
server |
|
b. |
HTML document |
|
c. |
browser |
|
d. |
IP address |
Question 3
A(n) ____ comes into existence as soon as a work is placed into a tangible form.
a. |
open-source project |
|
b. |
copyright |
|
c. |
reproduction notice |
|
d. |
lien |
Question 4
A(n) ____ is a small file that a web server writes to the disk drive of the client computer, containing information about the user.
a. |
wafer |
|
b. |
biscuit |
|
c. |
cookie |
|
d. |
triffle |
Question 5
According the Radicati Group, approximately ____% of all email messages sent every day are spam.
a. |
50 |
|
b. |
40 |
|
c. |
75 |
|
d. |
90 |
Question 6
All of the following are popular choices for virus protection EXCEPT _____.
a. |
ZoneAlarm |
|
b. |
McAfee Intel Security |
|
c. |
SpamBeGone |
|
d. |
Symantec |
Question 7
All of the following are ways to use Chrome efficiently EXCEPT:
a. |
use the shift key and the spacebar to scroll up one page |
|
b. |
use the control key and the + key to zoom in |
|
c. |
use the space bar to scroll down one page |
|
d. |
use the control key and the = key to zoom to the original page view |
Question 8
Copying and pasting contents of a received message into a new message allows you to ____.
a. |
remove viruses embedded in the text |
|
b. |
see who received a Bcc of the original message |
|
c. |
forward a message while maintaining the privacy of the original sender |
|
d. |
all of the above |
Question 9
Ctrl + S in most browsers allows you to save a webpage in all of the following formats EXCEPT:
a. |
webpage complete |
|
b. |
webpage HTML only |
|
c. |
text file |
|
d. |
webpage, no ads |
Question 10
Edge includes a _____ feature that allows users to manage their online reading.
a. |
Library |
|
b. |
Reading List |
|
c. |
Bookshelf |
|
d. |
Read Now |
Question 11
Edge includes a _____, which is a streamlined and less cluttered view that allows readers to focus on the selected material
a. |
Reading View |
|
b. |
NewsPrint View |
|
c. |
Reduced View |
|
d. |
Book View |
Question 12
Edge uses the _____ search engine as its default.
a. |
|
|
b. |
Bing |
|
c. |
Ask.com |
|
d. |
Yahoo |
Question 13
Even though U.S. law has a(n) ____ provision that allows students to use limited amounts of copyrighted information in term papers, you should always cite your sources.
a. |
lien |
|
b. |
escape clause |
|
c. |
Freedom of Information Act |
|
d. |
fair use |
Question 14
Firefox allows for easy drag-and-drop modifications to its _____.
a. |
history list |
|
b. |
navigation list |
|
c. |
menu |
|
d. |
address bar |
Question 15
Firefox is an open-source software, which means that Mozilla has given others the right _____.
a. |
study its code |
|
b. |
modify its code |
|
c. |
all of the above |
|
d. |
distribute its code |
Question 16
Firefox uses _____ to enhance and extend its functionality.
a. |
add-ons |
|
b. |
apps |
|
c. |
web enhancers |
|
d. |
extensions |
Question 17
Google’s browser is called ____.
a. |
Chrome |
|
b. |
Safari |
|
c. |
Firefox |
|
d. |
Opera |
Question 18
HTML stands for ____.
a. |
HotMail |
|
b. |
Hypertext Media Language |
|
c. |
Hypertext Markup Language |
|
d. |
Hex Traffic Media Link |
Question 19
If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____.
a. |
only open the file in the evenings, when malicious code is less virulent |
|
b. |
contact the local police so they can run a trace on the email |
|
c. |
immediately delete the email and reboot the computer |
|
d. |
avoid opening the file until you are sure that it doesn’t contain a virus |
Question 20
If you type nbc.com in the Address bar, your browser will convert it to ____ and load the home page at that URL.
a. |
ftp://nbc.com |
|
b. |
http://www.nbc.com |
|
c. |
ftp://nbc.net |
|
d. |
http://www.nbc.com.home |
1) four 2) HTML document 3) copyright 4) cookie
Question 1 A URL is a ____-part addressing scheme a. two b. four c. three...
Hi, i was testing the first part of the question with this code
and failed to download the web page, may i know the mistakes? While
you're at it, could you display the full answer to the questions as
well. I have just started taking this course and this question is
from my second assignment. Thanks :)
The W3Schools Tag Reference Task 1.1 (1 point) Recreate this webpage A sweet download page mocku This link to task1-1.html (this file) will...
Perform all of the following steps using Notepad to complete this assignment: 1) Begin by creating a new file in your text editor and include all of the basic HTML code like you did in your previous assignments. Or you can simply make a copy of your HTML file from last week and name the new copy LastFirstAssignment7.html (where “Last” is your last name and “First” is your first name), but be careful not to overwrite your file from last...
JUDY'S HTML TUTORIAL MENU CREATING YOUR FIRST WEB PAGE The best way to make a web page is to just dive right in. Open Notepad. To open notepad in Windows, click the windows icon in the lower left corner of the screen and then type "notepad." Notepad is a text editor. Other text editors you may consider are TextPad, Sublime Text, or NotePad++. Do not use Word or WordPad; they are word processors. If you are using an Apple computer...
Part - Web Server Setup and Demonstration (AJ Objective The objective of this assignment is to some HTTP as application layer protocol and TCP as reliable transport layer protocol HTTP is carried by TCP. Also, in the assignment you will investigate the working of client-server mechanism from both application and networking perspective There are several different ways to setup an HTTP server, including through Apache Tomcat, Apache Glassfish that integrales in an IDE such as Eclipse/NetBeans or even a browser...
QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...
Question 1 To remove the underlining from an <a> element, you can use CSS to set its A. text-decoration property to none B. text-decoration property to off C. underline property to none D underline property to off Question 2 You can use the CSS list-style-type property to change A. the bullet style in an unordered list B the number style in an ordered list C the terms style in a description list Dthe bullet or number style in an unordered...
Question 1 To remove the underlining from an <a> element, you can use CSS to set its A. text-decoration property to none B. text-decoration property to off C. underline property to none D underline property to off Question 2 You can use the CSS list-style-type property to change A. the bullet style in an unordered list B the number style in an ordered list C the terms style in a description list Dthe bullet or number style in an unordered...
QUESTION 6 When you use URL encoding for session tracking, you must 1. a and b above 2. a, b, and c above 3. convert all HTML pages in the application to JSPs 4. use the encodeURL method to encode all URLs in the servlets 5. use the encodeURL method to encode all URLs in the JSPs QUESTION 7 The best way to develop Java web applications is to use an Integrated Development Environment such as: 1. Foxfire or Netscape...
Question 1: Given the following HTML code segment <p>While this is a <b> very basic HTML document </b>, it actually serves as a detailed example of the document object model. </p> How many text nodes will be added to the DOM tree to represent the structure of text content in this HTML code segment A. 1 B. 2 C. 3 D. 4 Question 2: Assume in an HTML document named “index.html”, the following <script> element is added <script src="grocery.js"></script> This...
Which of the following codes is used to provide positioning relative to the nearest container? 1. a) position: fixed b) position: static; c) position: absolute d) position: relative; e) position: none; 2. What is called a, b and c in a style as "a (b: c; d: e:]"? a) a:selector, b:property, c:value b) a:property, b:selector, cvalue c) avalue, b:selector, c:property d) a:selector, b:value, c:property e) a:property, b:value, c:selector What is the style of command when the CSS code is written...