To access a cookie once it has been set, the ___________ can be used.

a. $_COOKIE
b. $_REQUEST
c. $_SET_COOKIE
d. (a) or (b)
e. (b) or (c)
f. (a) or (c)
g. all of the above are acceptable


d. (a) or (b)

Computer Science & Information Technology

You might also like to view...

If you use a hexadecimal value for a color, you preface the hexadecimal string with a(n) ____.

A. pound symbol B. ampersand C. question mark D. exclamation point

Computer Science & Information Technology

Which of the following is an example of a technological breakdown?

A) Employee death B) Air conditioning failure C) Chemical spill D) Spam

Computer Science & Information Technology

To maintain the aspect ratio when resizing an image manually, drag a ____ sizing handle.

A. top B. bottom C. corner D. left or right

Computer Science & Information Technology

Although the Banker's Algorithm has been used to avoid deadlocks in systems with a few resources, it isn't practical for most systems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology