The _________ contains field names and data values appended to a URL.

Fill in the blank(s) with the appropriate word(s).


query string

Computer Science & Information Technology

You might also like to view...

In the figure above, item 1 is pointing to the ____.

A. touchpad B. CD/DVD drive C. display device D. hard disk drive

Computer Science & Information Technology

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus?

A. rootkit B. backdoor C. wrapper D. shield

Computer Science & Information Technology

In SQL, the ____ symbol is used as a wildcard to represent any collection of characters.

A. * B. % C. ? D. !

Computer Science & Information Technology

Hybrid notebook-tablet computers are also called convertible tablets or ____.

A. 2-in-1 computers B. netbook computers C. laptop computers D. PDAs

Computer Science & Information Technology