?Briefly describe three guidelines for writing good HTML code that potential web page authors should be familiar with.
What will be an ideal response?
?Become well versed in the history of HTML and various versions of HTML and XHTML. Unlike other languages, HTML history impacts how one writes the html code.Become familiar with what different browsers can and cannot do.
Test the code. If the code has to support several types of browsers and several types of devices, get them and use them to view the documents. Do not assume that if the page works in one browser it will work in an older version of that same browser. In addition, a given browser version might even perform differently under different operating systems.
You might also like to view...
Break up into groups of five. Assign one person to be the website designer, one to write copy for a company’s product, one to keep track of customer payments, one to worry about distribution, and one to satisfy customers who have questions about using the product. Then select a simple product (one that does not have too many different versions). Good examples are a disposable camera, a D V D player, a box of candy, and a specialty travel hat. Now spend 20 minutes trying to explain to the website designer what to put on the website. Describe in about three paragraphs what experience your group had in coordination. Elaborate on the interrelatedness of subsystems in the organization (your group).
What will be an ideal response?
What is the difference between a SmartArt List diagram and a SmartArt Process diagram?
A) Lists are always vertically displayed while Processes are always displayed horizontally. B) They both show a process or timeline, but Lists are vertical and Processes are horizontal. C) Lists are always horizontally displayed while Processes are always displayed vertically. D) List is for non-sequential information; Process is for steps in a process.
How can you create a DMZ-like zone within a virtual data center using vCloud Air?
A. The "DMZ" network option can be selected in the edge gateway for desired DMZ member VMs. B. A combination of both routed and isolated networks can be used to establish a DMZ. C. A private NAT network can be created, then bridged to a public routed network, establishing a DMZ. D. A special request to VMware must be made to provision a virtual switch that will provide DMZ access for a network.
Which one of the following is not a type of phishing attack?
a. Whaling b. Smishing c. Spear phishing d. Wishing