Case-Based Critical Thinking Questions
?
Case 1-1
Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishments, her work history, and the different computer courses she has taken. She would like each section to be clearly identified.
?
What would be the best file name for Lucy's page according to Internet conventions?
A. ?Lucy's Info
B. ?lucysinfo
C. ?LucysInfo
D. ?Lucys Info
Answer: B
You might also like to view...
The _________ attack is designed to circumvent filtering rules that depend on TCP header information.
A. ?source routing ? B. ?IP address spoofing C. ?network layer address spoofing ? D. ?tiny fragment
You would choose which of the following workbooks to save a macro that is used in other workbooks?
A) Personal Macro Worksheet B) Personal Macro Workbook C) Personal Worksheet D) Personal Workbook
The technique of ____________________ programming includes code to check for improper input data.
Fill in the blank(s) with the appropriate word(s).
The first step in evaluating access is to determine if access permission is enabled at the VPN (or dial-up RAS) server.
Answer the following statement true (T) or false (F)