?The _____ property should be used only when no markup tags are involved.

A. ?innerHTML
B. ?outerHTML
C. ?textContent
D. ?insertAdjacentHTML


Answer: C

Computer Science & Information Technology

You might also like to view...

You discover that credit information on you is inaccurate. Which principle does this violate?

a. Limited Collection b. Quality c. Security d. Openness

Computer Science & Information Technology

The prosecution was trying to enter a document as evidence which would have a severely negative impact on the defense's case. The document was clearly related to the case at hand and was obviously obtained legally, morally, and ethically. Which of the following might be a circumstance that would force the judge to disallow the evidence without calling a lot of expert witnesses?

a. The evidence was not material. b. The evidence was contaminated. c. The evidence is not probative. d. Under the conditions described, there's little chance of getting the evidence disallowed.

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Fills a destination area using the format of the source area; no content is copied. B. Pastes the contents and format of the source area. C. Copies the format and contents. D. Returns a number that corresponds to the system date and time beginning with December 31, 1899. E. Keeps a cell reference constant when copying a formula or function. F. Assigns a value to a cell based on a logical test. G. Indicates a cell is using a name Excel does not recognize. H. Shows the relationship or proportion of parts to a whole. I. Scrutinizes the impact of changing values in cells that are referenced by a formula in another cell. J. Determines the value of a cell on which the formula depends.

Computer Science & Information Technology

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

A. Add a router and enable OSPF. B. Add a layer 3 switch and create a VLAN. C. Add a bridge between two switches. D. Add a firewall and implement proper ACL.

Computer Science & Information Technology