Define named anchors and discuss their uses on a web page.

What will be an ideal response?


Some web pages have so much content that viewers must scroll repeatedly to get to information at the top and bottom of the page. To make it easier for viewers to navigate to specific areas of a page without scrolling, you can use a combination of internal links and named anchors. A named anchor is a specific locations on a web page that are represented by a tag and an assigned descriptive name. You then create internal links on the page that the user clicks to jump to browse to the named anchor location. For example, you can insert a named anchor called "top" at the top of a web page, then create a link at the bottom of the page that, when clicked, will display the anchor location (the top of the web page) when viewed in the browser. You can also insert named anchors at strategic spots on a web page, such as paragraph headings. The name chosen for a named anchor should be short and reflect its page location. Also, you should use only lowercase characters; do not use spaces or special characters, or begin an anchor name with a number. The logical order for creating and linking to named anchors is to create a named anchor before you create its link to avoid possible errors.

Computer Science & Information Technology

You might also like to view...

Note that the Unicode for character A is 65. The expression "A" + 1 evaluates to ________.

a. 66 b. B c. A1 d. Illegal expression

Computer Science & Information Technology

With a cost field, you do not have to enter values with dollar signs and cents, because the numbers are formatted as ____________________ automatically.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the following security roles on the left with the job descriptions on the right

1. data owner a. implements the information classification and controls after they are determined 2. data custodian b. monitors user activities to ensure that the appropriate controls are in place 3. security analyst c. determines the classification level of the information for which he is responsible 4. auditor d. assesses the security needs of the organization

Computer Science & Information Technology

Your company is about to upgrade it databases through a third party. You have been asked to ensure that no sensitive information is compromised throughout the project. The project manager must also ensure that internal controls are set to mitigate the potential damage that one individual's actions may cause. Which of the following needs to be put in place to make certain both organizational

requirements are met? A. job rotation and NDA B. job rotation and MOU C. separation of duties and NDA D. separation of duties and MOU

Computer Science & Information Technology