Case Based Critical ThinkingKatie's team takes on their biggest challenge to date: designing and producing a cookbook.

Katie has a kickoff meeting to discuss the project with her staff. Someone on her team asks for advice on creating an index.  What does Katie tell them?

A. You can only create one entry per index item
B. You cannot anticipate the way in which a reader will search, so just add the one entry that is the closest to the item
C. Cookbooks do not require an index
D. Create a cross reference using the New Cross-reference dialog box


Answer: D

Computer Science & Information Technology

You might also like to view...

Each of the following statements about a typical mobile social navigation app is true. Which most captures the essence of the application?

a. The app processes massive amounts of crowdsourced data—that is, the data that’s continuously supplied by users through their mobile GPS-based devices worldwide. b. The app uses speech synthesis to speak driving directions and alerts to you, and speech recognition to understand your spoken commands. c. The app uses your phone as a streaming Internet of Things (IoT) device. Each phone is a GPS sensor that continuously streams data over the Internet to the app. d. The app probably stores its routing information in a graph database. Such databases can efficiently calculate shortest routes.

Computer Science & Information Technology

Use a building-block approach to creating your programs. Avoid reinventing the wheel—use existing pieces wherever possible. Such software ______________ is a key benefit of object-oriented programming.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match each item with a statement below.

A. An autoconfiguration protocol used on IP networks B. A series of computer devices or nodes interconnected by communication paths C. A collection of computers on a LAN that share common resources and responsibilities D. The principal communications protocol used for relaying packets across the Internet E. A network architecture in which each computer or process on the network is either a client or a server F. A numeric label assigned to each computer, printer, and other devices in a computer network G. A network protocol used by Windows 10 and CentOS 7 computers that allow systems within the same network to share files H. The CentOS 7 implementation of peer-to-peer networking I. A secured private network connection built on top of publicly accessible infrastructure J. A naming convention used primarily to specify and map network drives

Computer Science & Information Technology

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

Answer the following statement(s) true (T) or false (F)

Computer Science & Information Technology