Case-Based Critical Thinking Questions
?
Case 1-1
Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishments, her work history, and the different computer courses she has taken. She would like each section to be clearly identified.
?
What would be the best file name for Lucy's page according to Internet conventions?

A. ?Lucy's Info
B. ?lucysinfo
C. ?LucysInfo
D. ?Lucys Info


Answer: B

Computer Science & Information Technology

You might also like to view...

The _________ attack is designed to circumvent filtering rules that depend on TCP header information.

A. ?source routing ? B. ?IP address spoofing C. ?network layer address spoofing ? D. ?tiny fragment

Computer Science & Information Technology

You would choose which of the following workbooks to save a macro that is used in other workbooks?

A) Personal Macro Worksheet B) Personal Macro Workbook C) Personal Worksheet D) Personal Workbook

Computer Science & Information Technology

The technique of ____________________ programming includes code to check for improper input data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The first step in evaluating access is to determine if access permission is enabled at the VPN (or dial-up RAS) server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology