Question 61
The tag for creating a numbered list is ____.
a. |
<ol> |
|
b. |
<li /> |
|
c. |
<ul> |
|
d. |
<nl> |
1 points
Question 62
The term for a collection of website files stored on a web server is ____.
a. |
active website |
|
b. |
local website |
|
c. |
remote website |
|
d. |
plug-in website |
1 points
Question 63
The text editor installed with Windows is called ____.
a. |
web pad |
|
b. |
MS Sketch |
|
c. |
Notebook |
|
d. |
Notepad |
1 points
Question 64
The text lists all of the following as commonly used browser extensions EXCEPT ____.
a. |
Adobe Reader |
|
b. |
RealPlayer |
|
c. |
Firefox |
|
d. |
Shockwave Player |
1 points
Question 65
The textbook mentions JavaScript Kit and ____ as an online resource with thousands of free scripts that you can use in your webpages.
a. |
JavaNet |
|
b. |
JavaScript Source |
|
c. |
Javabean |
|
d. |
All 4 Java |
1 points
Question 66
The two filename extensions associated with webpages are .html and ____.
a. |
.xhtml |
|
b. |
.web |
|
c. |
.htm |
|
d. |
.www |
1 points
Question 67
To access the Internet using a WWAN, you need a USB modem for the device you want to use and ____.
a. |
an account with the appropriate cellular carrier |
|
b. |
a credit card |
|
c. |
access to a hotspot |
|
d. |
a MiFi device |
1 points
Question 68
To create bold text, you can use the tag <b> or ____.
a. |
<xb> |
|
b. |
<em> |
|
c. |
<bold> |
|
d. |
<strong> |
1 points
Question 69
To process a script, a browser must have a feature called a scripting ____.
a. |
add-on |
|
b. |
decoder |
|
c. |
engine |
|
d. |
compiler |
1 points
Question 70
To specify a red font color within a tag, the syntax would be ____.
a. |
color: red |
|
b. |
colour: red |
|
c. |
color= red |
|
d. |
color:: red |
1 points
Question 71
To view an HTML document stored on your computer in a web browser, use the ____ menu in the browser.
a. |
Options |
|
b. |
View |
|
c. |
Edit |
|
d. |
File |
1 points
Question 72
Unlike WLAN technology, Bluetooth requires ____ access point(s) for communication.
a. |
2 |
|
b. |
up to 8 |
|
c. |
1 |
|
d. |
0 |
1 points
Question 73
Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
a. |
Nigerian bank scam |
|
b. |
over-the-shoulder attack |
|
c. |
phishing expedition |
|
d. |
wardriving attack |
1 points
Question 74
Website creation and management apps and tools provide a(n) _____ and generate the code needed to create webpages.
a. |
storyboards |
|
b. |
domain name |
|
c. |
expression builder |
|
d. |
GUI |
1 points
Question 75
When an HTML document includes a script, it is included the ____ section.
a. |
body |
|
b. |
comment |
|
c. |
active content |
|
d. |
head |
1 points
Question 76
When choosing a web hosting provider it is important to consider all of the following EXCEPT:
a. |
types of web servers the company uses |
|
b. |
the services the web hosting provider provides |
|
c. |
the software used to run the servers |
|
d. |
the amount of active content that will be processed on the website |
1 points
Question 77
With WEP encryption, the key being used to encrypt the data is sent over the network ____ the actual data is encrypted.
a. |
before |
|
b. |
at the same time as |
|
c. |
after |
|
d. |
any of the above are possible |
1 points
Question 78
XHTML is currently in version ____.
a. |
2.0 |
|
b. |
1.0 |
|
c. |
1.1 |
|
d. |
2.1 |
1 points
Question 79
You include ____ tags in your webpages to provide keywords that search engines can use to learn how to list your site.
a. |
<meta> |
|
b. |
<k> |
|
c. |
<search> |
|
d. |
<keyword> |
1 points
Question 80
____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.
a. |
WPA |
|
b. |
WAP |
|
c. |
WEP2 |
|
d. |
WEPX |
Q61
For this we use oredered list i.e. <ol> tag
Q62
The correct term is a remote website
Q63
Text Editor in windows is known as Notepad
Q64
Firefox is a browser not an extension
Q66
The extensions associated with html are .htm and .html
Q68
We can use <strong> tag to make text bold
Q70
is the correct syntax
color: red |
Q73
It is known as over the shoulder attack
Q76
We can safely ignore the software that runs on the server but we need to know about the hardware, load capacity and features of the web server
Q78
XHTML 2.0 is the latest
Q80
WPA was developed to address the weakness of WEP
In case there are doubts leave a comment. Do give a thumbs up
Get Answers For Free
Most questions answered within 1 hours.