VRML is inserted into HTML documents using ________.

a) the EMBED element
b) the OBJECT element
c) the VRML element
d) Microsoft Agent


a) the EMBED element

Computer Science & Information Technology

You might also like to view...

When AP divs overlap, the lower-numbered AP divs are at the front of the stack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Information is ________ using a key. In Access, the key will be a password. In other applications, the key can be a separate file

A) decrypted B) secured C) encrypted D) shared

Computer Science & Information Technology

Secure IMAP4 uses TCP port _______________.

A. 0 B. 3 C. 3 D. 5

Computer Science & Information Technology

Which action should be avoided when collecting evidence of a cybercrime?

A. Taking photographs of information displayed on screen B. Rebooting the suspect's computer C. Removing power from a storage device D. Preserving contents of RAM

Computer Science & Information Technology