Match each item with a statement below:

A. Opens a potential security hole in your website
B. Makes web pages dynamic by combining JavaScript, HTML, CSS, and the Document Object Model
C. ?The key component of Ajax
D. Restricts how JavaScript code in one window, tab, or frame accesses a web page in another window or frame on a client computer
E. Someone or something that acts or performs a request for another thing or person
F. Provides services or data in response to requests that use its methods and properties
G. Uses a special HTTP response header to indicate response data may be used on other domains
H. Lets a user's browser know that a cross-domain request is authorized
I. Three digits returned from an HTTP server
J. Contains HTTP response as a text string


A. ?JSON-P
B. DHTML
C. XMLHttpRequest object
D. same-origin policy
E. proxy
F. web service
G. ?CORS
H. Access-Control-Allow-Originheader
I. ?status code
J. ?responseText property

Computer Science & Information Technology

You might also like to view...

The term ________ is used to describe items that are adjacent to another

A) non-continuous B) synchronous C) contiguous D) continuous

Computer Science & Information Technology

Which formatting applied to a document sets the equivalent of a blank line between each pair of text lines?

A) single-spacing B) double-spacing C) 1.5 spacing D) triple-spacing

Computer Science & Information Technology

What is the time limit given for completing the GCFA written exam?

What will be an ideal response?

Computer Science & Information Technology

In a sequence diagram, a lifeline is identified by a _____ line.

A. solid B. dashed C. red D. curved

Computer Science & Information Technology