To make changes to locked areas, you need to edit the ____ file on which the page is based, rather than editing the page itself.

A. .html
B. .dwt
C. .css
D. .htm


Answer: B

Computer Science & Information Technology

You might also like to view...

The Quick Access gallery provides easy access to common formatting tools. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.

A. SYN flood B. ICMP flood C. Ping of Death D. smurf attack

Computer Science & Information Technology

An opening in a computer tower used for the installation of equipment such as a hard drive is called a port.

a. true b. false

Computer Science & Information Technology

A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.

A. operating system B. information system C. device D. utility program

Computer Science & Information Technology