________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it

A) Tagged B) Hyperlinked C) Streaming D) Top-level


C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Bar codes encode text, graphics, and data into small rectangular dots on a narrow strip of paper. 2. Radio frequency identification allows the automatic collection of data using RFID tags or transponders that contain a chip and an antenna. 3. Active RFID tags are much less reliable because they depend on their own power supply, which may fail. 4. The analyst must assume that errors in the data will not occur.

Computer Science & Information Technology

Unsolicited and unwanted e-mail is commonly referred to as ________

A) an out of office assistant B) presorted e-mail C) a field D) junk e-mail

Computer Science & Information Technology

The ____ of a variable means where a variable can be referenced within a program.

A. range B. life C. versatility D. scope

Computer Science & Information Technology

The world in which the MMOG action takes place is created and managed by special computers called ____.

A. game hosts B. game servers C. game clients D. game servlets

Computer Science & Information Technology