_____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.
A. Search engine optimization
B. Implicit personalization technique
C. Explicit personalization technique
D. Phishing
Answer: C
You might also like to view...
You can subtly mask or show non-destructive filters using the ____ mask in conjunction with the Brush tool, a gradient, etc.
A. motion B. filter C. spot D. shadow
What is wrong with this code?
``` int ConvertFtToInches( int ft ) { int inches; inches = ft * 12; } ``` A. The function name is invalid. B. You can’t have the variable name in the input argument list. C. There is no returned value. D. It will return the wrong value.
When a graphic is linked, the border appears as a rectangle around the graphic (unless the border is 0 pixels) in the color ____.
A. blue B. black C. you set for links in the page properties D. you set for graphics in the page properties
PNG files use a Lossy image compression algorithm
Indicate whether the statement is true or false