____ is the most widely adopted schema standard.

A. DDML
B. RELAX
C. TREX
D. XML Schema


Answer: D

Computer Science & Information Technology

You might also like to view...

A file that has a .h extension is called a _____________________.

A. main program file B. class specification file C. class implementation file D. header file

Computer Science & Information Technology

A(n) ____ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

A. stealth B. silent C. passive D. encapsulated

Computer Science & Information Technology

If you are running Windows, you can manage your files using ____.

A. the Start button B. Internet Explorer C. Windows Explorer D. the Windows Control Panel

Computer Science & Information Technology

A(n) ____ is a general underlying theme that unifies the various elements of a site and contributes to the site's look and feel.

A. information architecture B. navigation structure C. user profile D. site concept

Computer Science & Information Technology