Good user habits can help prevent physical injuries and discomfort due...
Digital signature authenticates transactions.
The 1986 _____ provides the same protection that covers mail and...
A _____ is a separate area of a hard disk that holds an infected file...
If a company needs to store data about its customers, employees,...
Three types of XHTML DTDs are: transitional, frameset, and...
Spyware programs can harvest personal data by reading cookies and...
Using available technology to work from home or an off-site location...
This English-like language was designed to make possible the easy...
Too much web traffic can ___________ a web site or even prevent access...
All tags in XHTML are lower case.
A device that can be used to connect a notebook PC to conventional...
Encryption is a technique for scrambling documents so that they are...
Select the correct letter(s) for the angle brackets < > to...
When the records of more than one table are necessary to answer a...
In XHTML, the <img> element is an empty element that must...
15. Many e-commerce sites use _____ to determine customer preferences.
The study and practice of using computing resources efficiently and...
Environmental responsibility involves:
Computers small enough that several hundred of them could fit inside...
When programmers violate the rules of a programming language, ____...
A(n) _____ diagram depicts a database's entities and their...
If you make a copy of a proprietary program and give it to a friend...
To be able to resume operation after its computer system is damaged or...
When the document conforms to the rules and requirements of XHTML, it...
A _____ is a program that copies itself repeatedly in memory or on a...
HTML has a stricter syntax than XHTML.
__________ is the exploitation of vulnerability in domain name servers...
A map of a database is called a__________.
E-commerce enables many travelers to get travel information and...
__________ software can be used for brochures, letters, web pages,...
An example of query criteria is:
Which of the following is an example of assistive technology?
To indicate that a Web page is secure, many browsers display...
The diamond shape in a program flow chart is used to represent...
___________ is a technique of exhaustively working through all...
Some viruses are hidden in _____, which are instructions saved in an...
The purpose of ergonomic keyboards is to:
XHTML tags are enclosed in square brackets.
Two popular screen readers are JAWS and ICE.
To ensure that an e-mail message or file came from the designated...
The nature of relationships can be examined further and quantified....
Which of the following is an advantage of a database management...
Elimination of data redundancy does not solve which problem:
When the document conforms to the rules and requirements of XHTML, it...
The relationship among tables is facilitated by ____ and ___...