Which of the following version numbers is an example of a major policy revision?
A) 3.5
B) 4.0
C) 4.1
D) 5.1
B) 4.0
Computer Science & Information Technology
You might also like to view...
A language using a text-based syntax intended to extend the power of HTML by separating data from presentation is called _______.
a. HML b. XML c. XHTML d. SGML
Computer Science & Information Technology
Elements that are directly next to each other are known as adjacent ______.
a. Children b. Parents c. Ancestors d. Descendents e. Siblings
Computer Science & Information Technology
Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?
A. egress filtering B. session hijacking C. data authentication D. network sniffing
Computer Science & Information Technology
When you are ready to deliver content for viewing by end users, you publish the Flash document as a(n) ____ file.
A. FLA B. SWF C. FLS D. SWA
Computer Science & Information Technology