On a secure website, a ____ icon may appear in the address bar.

A. bird
B. padlock
C. star
D. none of the above


Answer: B

Computer Science & Information Technology

You might also like to view...

As the layers pass the data through the protocol stack, the addition of a header and/or trailer is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Critical Thinking QuestionsCase G-2Trudy is a student at a local high school.  The annual science fair is coming up, and she is doing her project on the process of professional printing.  Much of her project focuses on color -- how it is created and used in the world of professional printing. Trudy knows that process color is made from using four process inks: magenta, black, yellow, and ____.

A. aqua B. cyan C. ecru D. beige

Computer Science & Information Technology

If your computer has a ________, someone else can gain access to it undetected.

A) zombie B) logic bomb C) rootkit D) botnet

Computer Science & Information Technology

Iterators are similar to pointers because of the:

a. * and ++ operators. b. -> operator. c. begin and end functions. d. & operator.

Computer Science & Information Technology