____ is the default type of text in Flash.

a. TLF
b. Heading
c. Classic
d. Valence


a. TLF

Computer Science & Information Technology

You might also like to view...

What will be displayed after the following statements execute?

int num1 = 5; int num2 = 3; cout << "The result is " << (num1 * num2 + 10) << endl; a. The result is 5 * 3 + 10 b. The result is (num1 * num2 + 10) c. The result is 25 d. The result is 65 e. None of these

Computer Science & Information Technology

For a simple BBS (Bulletin Board System) we use the following SQL statements to create two tables: one storing all posted messages and the other users who can post them.

CREATE TABLE Message (
mesgid INTEGER,
poster INTEGER,
subject CHAR(50),
body CHAR(255),
postdate DATETIME,
PRIMARY KEY mesgid,
FOREIGN KEY poster REFERENCES User (userid)
ON DELETE CASCADE
ON UPDATE CASCADE
)
CREATE TABLE User (
userid CHAR(50),
password CHAR(50),
email CHAR(50),
status CHAR(1),
PRIMARY KEY(userid)
)
(a) There is an error in one of the above statements. Point out the error, explain why it is wrong and correct the error by rewriting that SQL statement. (b) Suppose there is a user with userid John in the database who has posted 100 messages. What will the DBMS do if we delete John from table User? What if we change John's userid to Michael? (c) Write an SQL statement to create a view of those messages with all their attributes that are posted by 'John'. (d) Write an SQL statement to create a domain such that the status attribute can only take two values, i.e., 'j' and 's'. (e) Suppose occasionally the system will post some announcement messages, but unfortunately, the system is not a user (thus it does not appear in the User table). How can you allow these messages being posted while not adding a ?system user? and not violating the foreign key constraint? (f) One desirable advanced feature of the BBS system is that each user can post messages not only to the public, but also to a subset of other users that are explicitly specied by userid when the message is posted. How would you change the denitions of the above two tables so that this new feature can be implemented? (You may introduce other tables if necessary.)

Computer Science & Information Technology

As mobile devices leave the control of the organization, those same devices must be confirmed to no longer store any proprietary applications or data, a process called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statementsis true about worms?

a. They abuse email systems to send unsolicited email to large numbers of people. b. They allow hackers to destroy hard drives, corrupt files, and steal passwords by recording keystrokes and transmitting them to a server operated by a third party. c. They insert unwanted words, numbers, or phrases into documents or alter command functions in an infected document. d. They propagate without human intervention, often sending copies of themselves to other computers by email.

Computer Science & Information Technology