In: Computer Science
Question 41
Some tags include ____ that specify additional information about the content to be formatted by the tag.
a. |
modifiers |
|
b. |
variants |
|
c. |
optionals |
|
d. |
attributes |
1 points
Question 42
Some web hosting services will offer a(n) ____, which is helpful when analyzing who is coming to your site and which pages they are viewing.
a. |
site traffic report |
|
b. |
activity add-on |
|
c. |
URL forwarding service |
|
d. |
online backup |
1 points
Question 43
Some webpages include ____ content -- content that changes when you view the page.
a. |
static |
|
b. |
expressive |
|
c. |
dynamic |
|
d. |
structural |
1 points
Question 44
Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection.
a. |
piconet |
|
b. |
Wi-Fi service |
|
c. |
hotspot |
|
d. |
WWAN |
1 points
Question 45
Tags that are included within other tags are called ____ tags.
a. |
looped |
|
b. |
enclosed |
|
c. |
nested |
|
d. |
cocooned |
1 points
Question 46
The “center” value of the align attribute is ____ in XHTML.
a. |
deprecated |
|
b. |
fully supported |
|
c. |
standard |
|
d. |
unavailable |
1 points
Question 47
The <h1> tag is a ____ tag.
a. |
half-size |
|
b. |
level-one heading |
|
c. |
closing head |
|
d. |
text height |
1 points
Question 48
The <img /> tag is considered a ____ tag.
a. |
nested |
|
b. |
two-sided |
|
c. |
one-sided |
|
d. |
self-closing |
1 points
Question 49
The Bluetooth security concern posing the lowest threat is that of ____.
a. |
over-the-shoulder attacks |
|
b. |
bluebugging |
|
c. |
bluejacking |
|
d. |
cafe-latte attacks |
1 points
Question 50
The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine.
a. |
piconets |
|
b. |
infrared |
|
c. |
wired technology |
|
d. |
sensors |
1 points
Question 51
The amount of data that is transferred from the server is known as the site’s _____ or data transfer.
a. |
broadband |
|
b. |
bandwidth |
|
c. |
browser downloads |
|
d. |
rate speed |
1 points
Question 52
The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.
a. |
sometimes differ from |
|
b. |
always be less than |
|
c. |
always be the same as |
|
d. |
always be greater than |
1 points
Question 53
The first section of an HTML document is called the ____ section.
a. |
primary |
|
b. |
root |
|
c. |
title |
|
d. |
head |
1 points
Question 54
The following is NOT on the security checklist for installing a wireless router: ____.
a. |
Change the SSID frequently because SSIDs are not case sensitive |
|
b. |
Enable MAC address filtering on the wireless router or access point |
|
c. |
When not using the wireless network for an extended period of time, power it off |
|
d. |
If you must use WEP, change the passphrase occasionally |
1 points
Question 55
The following is an example of hacking: ____.
a. |
Hiding the SSID |
|
b. |
Using embedded sensors to track data |
|
c. |
Unauthorized access to information being sent over a wireless network |
|
d. |
Connecting up to eight devices through Bluetooth |
1 points
Question 56
The last item in an HTML document must be the ____ tag.
a. |
</close> |
|
b. |
<html> |
|
c. |
<close> |
|
d. |
</html> |
1 points
Question 57
The most popular formats for pictures on the web are JPG, GIF, and ____.
a. |
PNG |
|
b. |
BMP |
|
c. |
MP3 |
|
d. |
TIFF |
1 points
Question 58
The opening tag for bold text is ____.
a. |
</b> |
|
b. |
<b> |
|
c. |
<bold> |
|
d. |
<bb> |
1 points
Question 59
The page that opens when a hyperlink is clicked is called the hyperlink’s ____.
a. |
source |
|
b. |
destination |
|
c. |
target |
|
d. |
anchor |
1 points
Question 60
The safest wireless network is one that is ____.
a. |
encrypted with WPA using a 128-bit key |
|
b. |
turned off |
|
c. |
installed by a licensed professional |
|
d. |
only meant to be used at home |
Question 41 Some tags include ____ that specify additional information about the content to be formatted by the tag. d. attributes Question 42 Some web hosting services will offer a(n) ____, which is helpful when analyzing who is coming to your site and which pages they are viewing. a. site traffic report Question 43 Some webpages include ____ content -- content that changes when you view the page. c. dynamic Question 44 Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection. b. Wi-Fi service Question 45 Tags that are included within other tags are called ____ tags. c. nested Question 46 The “center” value of the align attribute is ____ in XHTML. a. deprecated Question 47 The <h1> tag is a ____ tag. b. level-one heading Question 48 The <img /> tag is considered a ____ tag. d. self-closing Question 49 The Bluetooth security concern posing the lowest threat is that of ____. c. bluejacking Question 50 The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine. d. sensors Question 51 The amount of data that is transferred from the server is known as the site’s _____ or data transfer. b. bandwidth Question 52 The coverage area for wireless broadband service will ____ the area where you can get cell phone reception. b. always be less than Question 53 The first section of an HTML document is called the ____ section. d. head Question 54 The following is NOT on the security checklist for installing a wireless router: ____. a. Change the SSID frequently because SSIDs are not case sensitive Question 55 The following is an example of hacking: ____. c. Unauthorized access to information being sent over a wireless network Question 56 The last item in an HTML document must be the ____ tag. d. </html> Question 57 The most popular formats for pictures on the web are JPG, GIF, and ____. a. PNG Question 58 The opening tag for bold text is ____. b. <b> Question 59 The page that opens when a hyperlink is clicked is called the hyperlink’s ____. a. source Question 60 The safest wireless network is one that is ____. b. turned off
************************************************** Thanks for your question. We try our best to help you with detailed answers, But in any case, if you need any modification or have a query/issue with respect to above answer, Please ask that in the comment section. We will surely try to address your query ASAP and resolve the issue.
Please consider providing a thumbs up to this question if it helps you. by Doing that, You will help other students, who are facing similar issue.