Critical Thinking QuestionsCase 7-1As part of the planning process for your new informational Web site, you want to add a form to gather feedback from your site's visitors. You meet today with your Web designer, Judy, to discuss the form.You ask Judy what the first step should be in planning the form. Judy tells you that the first step is to ____.
a. hire a form handler service to collect and send the visitors' feedback to your e-mail serverc. decide the form's purpose, the data you want to collect, and how the data will be submittedb. create the questions you want the visitor to answer as they complete the formd. insert form controls on your home page
What will be an ideal response?
Answer: C
You might also like to view...
Some ________ software might block file transfers using FTP software
A) firewall B) indexing C) copyrighted D) Telnet
A(n) _______________ statement defines the boundaries of a repeating section of code and controls whether the code is executed.
Fill in the blank(s) with the appropriate word(s).
Describe how security testing differs from ordinary functionality testing. What are the criteria for passing a security test that differ from functional criteria?
What will be an ideal response?
When sending a presentation directly through PowerPoint using Outlook, you can choose who to send it to using the ____.
A. Outlook Contacts dialog box B. Choose dialog box C. Select Names: Contacts dialog box D. Select Contacts dialog box