In the code below, the table contains ____.
1: LIONS.GIF
2: TIGERS.GIF
3: BEARS.GIF
4: OHMY.GIF

A. four rows
B. four columns
C. both a. and b.
D. neither a. nor b.


Answer: A

Computer Science & Information Technology

You might also like to view...

Briefly describe the three main types of software maintenance. Why is it sometimes difficult to distinguish between them?

What will be an ideal response?

Computer Science & Information Technology

One of the unique features of Alice is its ____.

A. use of structured programming B. use of object-oriented programming C. objects D. drag-and-drop interface

Computer Science & Information Technology

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments??

A. ?VMware vSphere B. ?Oracle VirtualBox C. ?Parallels D. ?Citrix Xen

Computer Science & Information Technology

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

Computer Science & Information Technology