_____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

A. Search engine optimization
B. Implicit personalization technique
C. Explicit personalization technique
D. Phishing


Answer: C

Computer Science & Information Technology

You might also like to view...

You can subtly mask or show non-destructive filters using the ____ mask in conjunction with the Brush tool, a gradient, etc.

A. motion B. filter C. spot D. shadow

Computer Science & Information Technology

What is wrong with this code?

``` int ConvertFtToInches( int ft ) { int inches; inches = ft * 12; } ``` A. The function name is invalid. B. You can’t have the variable name in the input argument list. C. There is no returned value. D. It will return the wrong value.

Computer Science & Information Technology

When a graphic is linked, the border appears as a rectangle around the graphic (unless the border is 0 pixels) in the color ____.

A. blue B. black C. you set for links in the page properties D. you set for graphics in the page properties

Computer Science & Information Technology

PNG files use a Lossy image compression algorithm

Indicate whether the statement is true or false

Computer Science & Information Technology