A DTD can be used to enforce a specific data structure on document content.

Answer the following statement true (T) or false (F)


True

Computer Science & Information Technology

You might also like to view...

My Belle Cosmetics is a large business that has sales well ahead of any other regional cosmetics firm. As an organization, it is very sensitive to color, because it introduces new color lines in its products every fall and spring. The company has recently begun using technology to electronically show in-store customers how they appear in different shades of cosmetics without requiring them to actually apply the cosmetics.

a. Design and draw a representation of a display screen that can be used by sales clerks at a counter to try many shades of lipstick and makeup on an individual customer very quickly and with a high degree of accuracy. Input from customers should be their hair color, the color of their favorite clothing, and their typical environmental lighting (fluorescent, incandescent, outdoor, and so on). b. Design and draw a representation of a display screen that is equivalent to the one in part a, but that vividly demonstrates to decision makers in My Belle how color improves the understandability of the screen. c. One of the affiliates My Belle has on the Web is a large department store chain. In a paragraph, describe how the display screen in Problem a can be altered so that an individual can use it and My Belle can put it on the department store’s ecommerce site to attract customers. d. Design a breadcrumb trail for the My Belle website. Make sure to include the names of key pages and show how a user could navigate between pages. Use shaded boxes at the top of the page to indicate the breadcrumb trail.

Computer Science & Information Technology

____ software has restrictions on its use that are delineated by copyright, patents, or license agreements.

A. Public domain B. Protected C. Proprietary D. Shrink-wrap

Computer Science & Information Technology

Match the following terms to their meanings:

I. IRM II. digital signature III. signature line IV. selfcert.exe V. digital certificate A. electronic stamp B. a self-certification program C. attachment to a file that guarantees authenticity D. service designed to help control who can access documents E. enables the user to digitally sign a document

Computer Science & Information Technology

____________________ means taking economic considerations into account when deciding what critical tasks to shorten.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology