Most Web browsers use a fill-in _____ for unordered lists.

A. square
B. rectangle
C. circle
D. bullet


Answer: C

Computer Science & Information Technology

You might also like to view...

The frameset DTD is best used for documents that need to strictly conform to the latest XHTML standards.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ is a protocol used to ensure that data transmitted to and from a remote computer is encrypted and secure.

A. Secure Shell (SSH) B. RPC C. SMTP D. FTP

Computer Science & Information Technology

The abbreviation DVI which connects monitors and other video displays stands for ____.

A. Digital Video Interaction B. Digital Visual Interface C. Direct Video Interaction D. Direct Visual Interface

Computer Science & Information Technology

Using a heuristic system to detect an anomaly in a computer's baseline, a system administrator was able to detect an attack even though the company signature based IDS and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an executable file onto the company PC from the USB port, and executed it to trigger a privilege escalation flaw. Which of the following attacks has MOST likely occurred?

A. Cookie stealing B. Zero-day C. Directory traversal D. XML injection

Computer Science & Information Technology