____________________ is used to trick visitors to open a site with false links so they find a site that is different from what they expected.

Fill in the blank(s) with the appropriate word(s).


Cloaking

Computer Science & Information Technology

You might also like to view...

When you pass an array to a function, the function receives __________.

a. a copy of the array b. the reference of the array c. the length of the array d. a copy of the first element

Computer Science & Information Technology

.wps is an example of a graphic file extension

Indicate whether the statement is true or false

Computer Science & Information Technology

One memory management technique frequently used by operating systems is ____________________, which uses a portion of the computer's hard drive as additional RAM.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Amy is new to using Excel and is learning how to enter data. Amy learns that all of the following are true about using AutoFill to fill in a series EXCEPT: ____.

A. When you drag the fill handle down or to the right, the series is continued in descending order. B. To fill a series, a pattern must be established in the initial selection of cells. C. When you drag the fill handle, the pattern or series is continued. D. You can modify the Fill settings in the Series dialog box.

Computer Science & Information Technology