Match each item with a statement below.

A. An extension to HTML that allows developers to define their own tags for structure.
B. Used to monitor the status and performance of network devices and systems.
C. Developed in 1987 by Larry Wall as an interpreted language (based on C syntax) that helps provide a more robust scripting capability for UNIX.
D. An attack that exploits a Web site's trust or previous authentication of a user.
E. Standardizes the HTML formatting for an entire Web site by allowing developers to customize fonts, tables, and other page elements.
F. Developed specifically to allow developers to create dynamically generated HTML content.
G. An API (application programming interface) that allows external programs or scripts to interact with a Web server.
H. Allows users to connect a remote shell to run programs, view files, and perform a variety of other operations as if they were using the system locally.
I. Designed to facilitate Usenet newsgroup communications.


A. XML
B. SNMP
C. Perl
D. CSRF
E. CSS
F. PHP
G. CGI
H. Telnet
I. NNTP

Computer Science & Information Technology

You might also like to view...

A separator bar can be inserted in a menu with which of the following characters?

a) - b) & c) _ d) /

Computer Science & Information Technology

A(n) ________ is a hierarchical structure used to group and summarize related data

Fill in the blank(s) with correct word

Computer Science & Information Technology

? Critical Thinking Questions Case 12-2 ? Jenny has created a website for a nutritionist that contains diet plans for various age groups. The website also includes audios and videos that train people on how they can get a healthy lifestyle by following good eating habits. On publishing the website, Jenny conducts a survey to solicit user feedback. According to the survey, the videos that play spontaneously whenever a particular diet plan is selected by a user are distracting. Users want to have control over whether they want to play the video or not. To prevent the video from playing spontaneously every time a diet plan is clicked, Jenny has to remove the _____ attribute from the video tag.?

A. ?plugandplay B. ?playsuit C. ?autoplay D. ?playwright

Computer Science & Information Technology

______ is the recommended technique for wireless network security.

A. Using encryption B. Using anti-virus and anti-spyware software C. Turning off identifier broadcasting D. All of the above

Computer Science & Information Technology