Describe the three-tier structure of checkpoints (priority-1, priority-2 and priority-3) set forth by the WAI.

What will be an ideal response?


Priority-1 checkpoints are goals that must be met in order to ensure accessibility.
Priority-2 checkpoints, though not essential, are highly recommended. Priority-3
checkpoints slightly improve accessibility.

Computer Science & Information Technology

You might also like to view...

You later decide that you want to add text to the photograph. You type in some text with the bounding box tool but quickly realize that the text takes up too much space on your photograph. What do you do to fix this problem?

a. Click the handles to reset the bounding box. b. Drag the handles to resize the bounding box. c. Hit ESC to cancel the effect. d. Rotate the bounding box.

Computer Science & Information Technology

________ is a business-centered social network that is designed for business connections

A) Facebook B) Twitter C) LinkedIn D) Yahoo!

Computer Science & Information Technology

A content footnote appears in the report as a superscript and the reference text displays at the bottom of the page to provide additional information to the reader.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What type of socket ensures that even force is applied to the processor when it is being installed in the socket?

A. ZIF B. FM2 C. LGA D. AM3

Computer Science & Information Technology