You can test whether a processor supports a particular extension element or attribute using the _____ function

A. ?element-available()
B. ?available()
C. ?test-element()
D. ?element-check()


Answer: A

Computer Science & Information Technology

You might also like to view...

____ is a tool of Windows operating systems that shows all event logs.?

A. ?Log Viewer B. ?Log Property C. ?Event Viewer D. ?Event Sharing

Computer Science & Information Technology

Computer security is the use of ____ security techniques to protect data stored on computers.

A. ?physical B. ?port C. ?logical D. ?encrypted

Computer Science & Information Technology

What type of inbound packet is characteristic of a ping flood attack?

A. ICMP echo request B. ICMP echo reply C. ICMP destination unreachable D. ICMP route changed

Computer Science & Information Technology

In the accompanying figure, item C indicates which of the following?

A. The user is not signed in B. The folios are all local C. The user is signed in D. A new folio will be created locally

Computer Science & Information Technology