Critical Thinking QuestionsCase 4-2You and a classmate, Joyce, are working on a new Web site project. You and Joyce meet after class to discuss formalizing your Web site plans.At today's planning meeting, Joyce suggests that Cascading Style Sheets (CSS), specifically external style sheets, be used to layout and format your Web pages. You tell Joyce that ____.

a. no, you should use direct formatting with inline styles, which is the most efficient way to layout and format Web pagesc. no, using CSS and external style sheets violates W3C standards for layout and formatting and you want the site to be standards compliantb. you agree; external style sheets will make the layout and formatting process more efficient and will help you control the look and feel of all pages at the sited. if she is really concerned about consistency and efficiency, using CSS is the wrong approach; using templates is the only way to go

What will be an ideal response?


Answer: B

Computer Science & Information Technology

You might also like to view...

____ an element takes that element out of the normal flow of the document and positions it along the left or right edge of its containing element.

A. Fixing B. Floating C. Designing D. Drawing

Computer Science & Information Technology

You have been recently hired as a security practitioner. Within in the first week of employment, you learn that the organization plans to introduce several new technologies on the enterprise. Which point should you stress to your immediate supervisor regarding new technologies?

A. New technologies often negatively impact enterprise security. B. New technologies are produced with security in mind and should have no adverse security effects. C. New technologies results in a more secure enterprise. D. New technologies are more secure than older technologies but can still have security issues if not installed according to the vendor's recommendations.

Computer Science & Information Technology

As the density, or number of keys relative to the length of an array decreases, so does the probability of hashing collisions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A. baseline detection B. anomaly detection C. behavior detection D. signature detection

Computer Science & Information Technology