As of July 2011, ____ of users have the Shockwave Player plug-in.

A. 33.4%
B. 41.0%
C. 52%
D. 98.5%


Answer: C

Computer Science & Information Technology

You might also like to view...

To send a message to more than one address you should enter additional addresses separated by a(n) _____.

A. period B. colon C. semicolon D. ampersand

Computer Science & Information Technology

The _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: H(M) = H(M1)

A. birthday B. chaining C. MAC D. hash

Computer Science & Information Technology

After a constraint is added to Solver Parameters, it cannot be deleted

Indicate whether the statement is true or false

Computer Science & Information Technology

__________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology