It is best to use relative font sizes specified with em or % in order to support accessible design.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a) Exception handling enables programmers to write robust and fault-tolerant programs. b) Exception handling can catch the exception but cannot resolve the exception. c) Exception handling can resolve exceptions. d) There are many ways of handling exceptions.

Computer Science & Information Technology

Match each term with the correct statement below.

A. a low-power, short-range, and low-data rate specification that is based on 802.15.4 but that includes standards for network configuration, security and other higher-level features B. set of standards primarily for smartphones and smart cards that is used to establish communication between devices C. an attack that accesses unauthorized information from a wireless device through a Bluetooth connection D. a WWAN based on IEEE 802.16-2004 that can serve as a substitute for fiber optic connections between buildings E. an RFID tag that does not have its own power supply but uses the tiny electrical current induced in the antenna by the incoming signal F. an optical, wireless, point-to-point, line-of-sight wireless technology for outdoor transmissions G. an IEEE 802.15.7 standard that transmits data by the intensity of the modulating optical source H. an attack that sends unsolicited messages to Bluetooth-enabled devices I. a network that introduces actuators in addition to sensors so that immediate effects can be made on the human body J. a network that utilizes sensors placed on the human body to monitor human biological functions that are transmitted to a third party physician

Computer Science & Information Technology

To put a long text label on two or more lines within a single cell

A) type the first line, then hit "Enter." B) type the second line then use the Backspace key. C) insert a line break with the "Alt + Enter" key combination. D) insert a text box using F4.

Computer Science & Information Technology

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server?

A. 22/tcp    open    ssh B. 23/tcp    open    telnet C. 443/tcp    open    https D. 993/tcp    open    imaps

Computer Science & Information Technology