The Web page in Figure 5-30 needs some help in organizing the text on the page. Someone has already tried to use some organizing principles when creating the page, but one principle in particular is lacking. Which one is it? Make a photocopy of the page, and, with paper and scissors, make a new version that applies the missing principle to communicate more clearly.


The missing principle is proximity. Note how the paragraph headings appear equally spaced from the previous paragraph and the next. Also, the three links out to the side are scattered. The solution (10 minutes) given here rectifies these problems. Again, student solutions will vary. It’s perfectly all right if they use a different size of browser frame in their solution or if the positions of the three links on the left side are at variance with the solution given here.

Computer Science & Information Technology

You might also like to view...

The variable that accumulates a total of the numbers in a running total is called a(n) ____________.

a. counter b. sentinel c. entity d. accumulator

Computer Science & Information Technology

In project management, a relationship between two tasks is usually interpreted as a precedence relationship; that is, one task must complete before the next one is initiated. In a software life cycle, a relationship between two activities is a dependency; that is, one activity uses a work product from another activity. Discuss this difference. Provide an example in the context of the V-model.

What will be an ideal response?

Computer Science & Information Technology

Under no circumstances should you attempt to create a forensically clean drive by simply ________ the drive

Fill in the blank(s) with correct word

Computer Science & Information Technology

IP spoofing

A. combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users. B. is a form of masquerading to gain unauthorized access to a web server. C. is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session. D. is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.

Computer Science & Information Technology