Which of the following version numbers is an example of a major policy revision?

A) 3.5
B) 4.0
C) 4.1
D) 5.1


B) 4.0

Computer Science & Information Technology

You might also like to view...

A language using a text-based syntax intended to extend the power of HTML by separating data from presentation is called _______.

a. HML b. XML c. XHTML d. SGML

Computer Science & Information Technology

Elements that are directly next to each other are known as adjacent ______.

a. Children b. Parents c. Ancestors d. Descendents e. Siblings

Computer Science & Information Technology

Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?

A. egress filtering B. session hijacking C. data authentication D. network sniffing

Computer Science & Information Technology

When you are ready to deliver content for viewing by end users, you publish the Flash document as a(n) ____ file.

A. FLA B. SWF C. FLS D. SWA

Computer Science & Information Technology