Define the following terms:

a) Action element.
b) Gunning Fog Index.
c) Screen reader.
d) Session.
e) Web Accessibility Initiative (WAI).


a) Action elements perform specified tasks, such as answering an incoming tele-
phone call or hanging up on a telephone call, during the current session.
b) The Gunning Fog Index is a formula that produces a readability grade when applied to a text sample. It allows Web developers to evaluate the readability grade of their Web sites, so that the Web sites are accessible to the majority of users.
c) A screen reader is a program that allows users to hear what is being displayed on their screen.
d) A session is any given telephone call to which the CallXML application responds. A CallXML application can support multiple sessions at once, and each session is
assigned a unique sessionID.
e) The Web Accessibility Initiative (WAI) is an attempt to make the Web more accessible. The WAI published the Web Content Accessibility Guidelines (WCAG) 1.0 to set forth checkpoints that helped businesses deter-
mine if their Web sites are accessible to everyone.

Computer Science & Information Technology

You might also like to view...

If you wish to pass an argument to a method, that method must contain a(n) ____ to store the argument.

A. local variable B. parameter C. instance variable D. global variable

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 1You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudocode.There is a method with the header: void printData(num x, string y). There is a declared numeric variable: test. Which of the following is a correct method call?

A. printData(test) B. printData(test, "Good") C. printData("Good", test) D. printData("Good", "Best")

Computer Science & Information Technology

A utility program that attempts to relocate files so they use the available hard drive space more efficiently is ________

A) disk cleanup B) task scheduler C) disk defragmenter D) backup

Computer Science & Information Technology

Does a VPN use symmetric or asymmetric encryption? Explain your answer

What will be an ideal response?

Computer Science & Information Technology