The ____ standards recommend that frames not be used for Web sites.

A. XHTML
B. NSF
C. HTML 5
D. ADA


Answer: D

Computer Science & Information Technology

You might also like to view...

You use the ____ tool in much the same way as you draw with a brush or pencil.

a. Magnetic Lasso b. Content-Aware c. Lasso d. Filter

Computer Science & Information Technology

Case 19-3 Linda has recently started her job as a nursing supervisor at Hankons Cancer Treatment Centre. As part of the job, she has to look into the database of all the currently admitted patients and their ongoing treatment status. ?Linda uses Microsoft Access 2016 to maintain the records of each patient. She wants to list the patients' names whose name start with "e" and end with "y" and contain four letters. Which of the following wildcard characters should Linda use for this search?

A. ?e[e-y][e-y]y B. ?e[a-z][a-z]y C. ?e [_ _] y D. ?e [**]y

Computer Science & Information Technology

An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.

A. man-in-the-middle B. timing C. known-plaintext D. selected-plaintext

Computer Science & Information Technology

What will allow the investigator to arrive at a scene, acquire the needed data, and return to the lab as quickly as possible?

a. A bit-stream copy utility b. An extensive-response field kit c. An initial-response field kit d. A seizing order

Computer Science & Information Technology