In: Computer Science
Question 41
 Some tags include ____ that specify additional information about the content to be formatted by the tag.
| a. | 
 modifiers  | 
|
| b. | 
 variants  | 
|
| c. | 
 optionals  | 
|
| d. | 
 attributes  | 
1 points
Question 42
Some web hosting services will offer a(n) ____, which is helpful when analyzing who is coming to your site and which pages they are viewing.
| a. | 
 site traffic report  | 
|
| b. | 
 activity add-on  | 
|
| c. | 
 URL forwarding service  | 
|
| d. | 
 online backup  | 
1 points
Question 43
Some webpages include ____ content -- content that changes when you view the page.
| a. | 
 static  | 
|
| b. | 
 expressive  | 
|
| c. | 
 dynamic  | 
|
| d. | 
 structural  | 
1 points
Question 44
Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection.
| a. | 
 piconet  | 
|
| b. | 
 Wi-Fi service  | 
|
| c. | 
 hotspot  | 
|
| d. | 
 WWAN  | 
1 points
Question 45
Tags that are included within other tags are called ____ tags.
| a. | 
 looped  | 
|
| b. | 
 enclosed  | 
|
| c. | 
 nested  | 
|
| d. | 
 cocooned  | 
1 points
Question 46
The “center” value of the align attribute is ____ in XHTML.
| a. | 
 deprecated  | 
|
| b. | 
 fully supported  | 
|
| c. | 
 standard  | 
|
| d. | 
 unavailable  | 
1 points
Question 47
The <h1> tag is a ____ tag.
| a. | 
 half-size  | 
|
| b. | 
 level-one heading  | 
|
| c. | 
 closing head  | 
|
| d. | 
 text height  | 
1 points
Question 48
The <img /> tag is considered a ____ tag.
| a. | 
 nested  | 
|
| b. | 
 two-sided  | 
|
| c. | 
 one-sided  | 
|
| d. | 
 self-closing  | 
1 points
Question 49
The Bluetooth security concern posing the lowest threat is that of ____.
| a. | 
 over-the-shoulder attacks  | 
|
| b. | 
 bluebugging  | 
|
| c. | 
 bluejacking  | 
|
| d. | 
 cafe-latte attacks  | 
1 points
Question 50
The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine.
| a. | 
 piconets  | 
|
| b. | 
 infrared  | 
|
| c. | 
 wired technology  | 
|
| d. | 
 sensors  | 
1 points
Question 51
The amount of data that is transferred from the server is known as the site’s _____ or data transfer.
| a. | 
 broadband  | 
|
| b. | 
 bandwidth  | 
|
| c. | 
 browser downloads  | 
|
| d. | 
 rate speed  | 
1 points
Question 52
The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.
| a. | 
 sometimes differ from  | 
|
| b. | 
 always be less than  | 
|
| c. | 
 always be the same as  | 
|
| d. | 
 always be greater than  | 
1 points
Question 53
The first section of an HTML document is called the ____ section.
| a. | 
 primary  | 
|
| b. | 
 root  | 
|
| c. | 
 title  | 
|
| d. | 
 head  | 
1 points
Question 54
The following is NOT on the security checklist for installing a wireless router: ____.
| a. | 
 Change the SSID frequently because SSIDs are not case sensitive  | 
|
| b. | 
 Enable MAC address filtering on the wireless router or access point  | 
|
| c. | 
 When not using the wireless network for an extended period of time, power it off  | 
|
| d. | 
 If you must use WEP, change the passphrase occasionally  | 
1 points
Question 55
The following is an example of hacking: ____.
| a. | 
 Hiding the SSID  | 
|
| b. | 
 Using embedded sensors to track data  | 
|
| c. | 
 Unauthorized access to information being sent over a wireless network  | 
|
| d. | 
 Connecting up to eight devices through Bluetooth  | 
1 points
Question 56
The last item in an HTML document must be the ____ tag.
| a. | 
 </close>  | 
|
| b. | 
 <html>  | 
|
| c. | 
 <close>  | 
|
| d. | 
 </html>  | 
1 points
Question 57
 The most popular formats for pictures on the web are JPG, GIF, and ____.
| a. | 
 PNG  | 
|
| b. | 
 BMP  | 
|
| c. | 
 MP3  | 
|
| d. | 
 TIFF  | 
1 points
Question 58
The opening tag for bold text is ____.
| a. | 
 </b>  | 
|
| b. | 
 <b>  | 
|
| c. | 
 <bold>  | 
|
| d. | 
 <bb>  | 
1 points
Question 59
The page that opens when a hyperlink is clicked is called the hyperlink’s ____.
| a. | 
 source  | 
|
| b. | 
 destination  | 
|
| c. | 
 target  | 
|
| d. | 
 anchor  | 
1 points
Question 60
The safest wireless network is one that is ____.
| a. | 
 encrypted with WPA using a 128-bit key  | 
|
| b. | 
 turned off  | 
|
| c. | 
 installed by a licensed professional  | 
|
| d. | 
 only meant to be used at home  | 
Question 41 Some tags include ____ that specify additional information about the content to be formatted by the tag. d. attributes Question 42 Some web hosting services will offer a(n) ____, which is helpful when analyzing who is coming to your site and which pages they are viewing. a. site traffic report Question 43 Some webpages include ____ content -- content that changes when you view the page. c. dynamic Question 44 Subscribing to a _____ requires payment for use but will provide a more reliable and secure connection. b. Wi-Fi service Question 45 Tags that are included within other tags are called ____ tags. c. nested Question 46 The “center” value of the align attribute is ____ in XHTML. a. deprecated Question 47 The <h1> tag is a ____ tag. b. level-one heading Question 48 The <img /> tag is considered a ____ tag. d. self-closing Question 49 The Bluetooth security concern posing the lowest threat is that of ____. c. bluejacking Question 50 The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine. d. sensors Question 51 The amount of data that is transferred from the server is known as the site’s _____ or data transfer. b. bandwidth Question 52 The coverage area for wireless broadband service will ____ the area where you can get cell phone reception. b. always be less than Question 53 The first section of an HTML document is called the ____ section. d. head Question 54 The following is NOT on the security checklist for installing a wireless router: ____. a. Change the SSID frequently because SSIDs are not case sensitive Question 55 The following is an example of hacking: ____. c. Unauthorized access to information being sent over a wireless network Question 56 The last item in an HTML document must be the ____ tag. d. </html> Question 57 The most popular formats for pictures on the web are JPG, GIF, and ____. a. PNG Question 58 The opening tag for bold text is ____. b. <b> Question 59 The page that opens when a hyperlink is clicked is called the hyperlink’s ____. a. source Question 60 The safest wireless network is one that is ____. b. turned off
************************************************** Thanks for your question. We try our best to help you with detailed answers, But in any case, if you need any modification or have a query/issue with respect to above answer, Please ask that in the comment section. We will surely try to address your query ASAP and resolve the issue.
Please consider providing a thumbs up to this question if it helps you. by Doing that, You will help other students, who are facing similar issue.