cis 150 final :)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Identify a contextual selector that matches any element.

*

Which of the following is true of the plug-in approach to deliver multimedia content?

A plug-in requires users to install a separate application in addition to their web browsers.

In the context of hypertext attribute, identify a target name that opens the page in the current window or tab.

_self

token metod

access method used to pass data in a ring typology network

extranet

area of the internet that only certain corporations pr people can access

brute force attack

attempt to access an account by repeatedly trying different passwords

Identify the property that can be used to change the definition of an element's background.

background-clip: type;

Which of the following styles is used to specify the type of tiling to be applied to a background image, or even turn off tiling?

background-repeat: type;

point of presence

bank of modems servers reputes and switches through which internet users connect to an internet service provider

Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

beta

The _____ grouping element contains content that is quoted from another source, often with a citation and often indented on a page.

blockquote

The width property of the _____ model is based on the sum of the content, padding, and border spaces and any space taken up by the padding and border is subtracted from space given to the content.

border box

Identify the property that is used to apply a border image.

border-image: url(url) slice repeat;

Which of the following properties is used to define the thickness of a specific border?

border-side-width: width;

Identify the property that is used to choose the layout model.

box-sizing

twisted pair cable

cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket

scalability

characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes

centralized

characteristic of client/server networks where the sever coordinates data security

decentralized

characteristic of peer to peer networks where the individual user coordinates data security

ring typology

circle of data that flows around the circle from device to device in 1 direction

Identify an attribute selector that recognizes groups of elements that share a similar characteristic or property.

class

In a two-sided tag, a(n) _____ tag indicates the content's end.

closing

To set the foreground or text color of an element, use the following property:

color: color;

honey pot

computer system thats set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something valuable

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

commerce server

computers that host software that enables users to buy goods and services over the web

Identify the default type for the box-sizing property.

content-box

The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.

control structures

Which of the following defines the default hotspot for an image?

coords="0,0,width,height"

Identify the coordinate attribute for the rectangular hotspots of an image.

coords="left,top,right,bottom"

To protect a movie, what category of intellectual property would be used?

copyright

JavaScript is used as a programming tool for:

creating interactive web forms and animated graphics.

Using your computer for non-work activities while you are being paid to work is known as ________.

cyberloafing

switch

device for transmitting data on a network. makes decisions and addresses it

terminator

device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it

Access card reader

device that reads info from a magnetic strop on the back of a credit card-like access card

biometric authentication device

device that uses some unique characteristic of human biology to identify authorized users

bridge

device used to send data two different collision domains in a network

________ allows only limited use of media that has been legally purchased.

digital rights management

Identify the attribute selector that matches all div elements whose class attribute begins with the text string "col-".

div[class^="col-"]

root DNS server

domain name system serve that contains the laster listings for an entire top-level domain

_____ is a popular design element which consists of an enlarged initial letter in a body of text that drops down into the text body.

drop cap

Which of the following style rules is used to draw a 1px red dotted line around every element on a web page along with a wildcard selector?

*{outline: 1px dotted red;}

Which of the following attribute selectors selects all elem elements whose att attribute ends with text?

elem[att$="text"]

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

Hypertext Transfer Protocol Secure (HTTPS)

ensures data is secure

A copyright holder cannot loan, rent, or give away the work.

false

A data-flow diagram provides a visual representation of an algorithm.

false

A denial-of-service attack can be used to deny hackers access to a computer system

false

A stealth virus is designed to infect multiple file types to fool the antivirus software.

false

An encryption virus replicates itself onto a hard drive's master boot record.

false

Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks.

false

Currently, there are no antivirus programs for mobile devices.

false

Ethical hackers are also known as white-hat hackers.

false

If a background extends through the border space by default, all coordinates for the image position are measured from the bottom-left corner.

false

Pictures you find on the Google image search are considered in the public domain.

false

Syntax errors are caught only when a program executes.

false

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

false

YouTube is the entity legally responsible for its content, rather than the person who uploaded the content

false

The _____ element is used to contain an image file and can also be used to mark any page content that should stand apart from the main content of an article.

figure

A final way to alter an object is through a Cascading Style Sheets (CSS) _____.

filter

Which of the following provides a visual representation of the patterns of an algorithm?

flowchart

A _____ sets the width of page elements as a percent of the available screen width.

fluid layout

Which of the following would NOT be used to build websites with interactive capabilities?

fortran

The _____ unit can be thought of as a share of available space.

fr

Identify a compare function that sorts numeric values in ascending order.

function ascending(a, b) {return a - b;}

Once a Cascading Style Sheets (CSS) grid is established, a specific element within a _____ is placed at the intersection of a specified row and column.

grid cell

frame

groups of data packets are sent together in a package

packet screening

having an external screening router examine incoming data packets to make sure they are legit

The _____ element, a Hypertext Markup Language (HTML) metadata element, contains a collection of metadata elements that describe the document or provide instructions to the browser.

head

bastion host

heavily secured server

access method

method to control which computer is allowed to use transmission media at a certain time

CSMA/CD

method used on ethernet networks to avoid data collisions

Identify a generic font group that is a typeface in which each character has the same width.

monospace

star typology

most widely deployed client/server network topology where nodes connect to a central communications device called a switch in a star pattern

Identify an expression that defines a date object.

new Date("month day, year hrs:mins:secs");

passive typology

nodes do nothing to move data along the network

active typology

nodes participate in moving dada thru the network

Identify the default clear value that allows an element to be displayed alongside any floated objects.

none

The _____ value of the display style removes an element from a rendered page.

none

Which is NOT a key factor a programmer uses in selecting the language for a project?

number of inputs required

possessed object

object that users carry to identify themselves and that grants them access to a computer system or facility

A(n) _____ is a line drawn around an element, enclosing the element content, padding, and border spaces.

outline

The scroll value of the overflow style keeps the element at the specified dimensions, but adds horizontal and vertical scroll bars to allow users to scroll through the _____ content.

overflowed

Which of the following digital image formats compresses the image file?

pdf

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming

network typology

physical or logical arrangement of computers transmission media and other network components

A(n) _____ represents a single dot on an output device.

pixel

In a fixed layout, the size of the page and the size of the page elements are fixed using _____ as the unit of measure.

pixels

Regarding computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

Inline styles are styles applied directly to specific elements using the style attribute<element style="property: value"> content </element>where element is the Hypertext Markup Language (HTML) element and _____ defines the styles that are applied directly to that element.

property: value

simple mail transfer protocol (SMTP)

protocol responsible for sending email along the internet to its destination

A popular programming language which is known for having a large number of free libraries is ________.

python

transmission media

radio waves or the physical system that transports data on a network

Which of the following can be used to express style in the outline-style property outline-style: style;?

ridge

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

The display type value _____ is displayed as a block unless its next sibling is also a block, in which case, it is displayed in-line, essentially combining the two blocks into one.

run-in

server-side program

runs on a web serve rather than on a computer

Identify a CSS3 2D transformation function that resizes an object by a factor of x horizontally.

scaleY(y)

Hypertext Markup Language (HTML) sectioning elements are also known as _____ because the tag name describes the purpose of the element and the type of content it contains.

semantic elements

A typeface in which a small ornamentation appears at the tail end of each character is _____.

serif

proxy server

server that acts as a go between connecting computers on the internal network with those on the external network

application server

server that acts as a repository for application software

authentication server

server that keeps track of who is logging onto the network and which serves on the network are available to each user

database server

server that provides client computers with access to info stored in databases

protocol

set of rules for exchanging communication

coaxial cable

single copper wire surrounded by layers of plastic installation metal sheathing and a plastic jacket used in cable tv and internet service

applet

small application located on a server, when it is requested the applet is downloaded to the client

device driver

software that facilitates the communication between the device and its operating system or between s network adapter an a servers operating system

network operating system

software that handles requests for info internet access and the use of peripherals

In the outline-style propertyoutline-style: style;style can be set to _____ for displaying a single line.

solid

Filter functions can be combined in a _____ to create new effects.

space-separated list

wireless network interface card

special network adapter card that allows a computing device to connect to a network using wireless access

When a doctype is present, browsers will render the page in _____ mode, employing the most current specifications of Hypertext markup Language (HTML).

standards

Browsers ignore any values specified for the left or top properties under _____ positioning.

static

An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a process known as _____.

style inheritance

The exact appearance of each page is described in a separate document known as a ______.

style sheet

bus typology

system of networking connections in which all devices are connected in sequence on a single cable

The Uniform Resource Locator (URL) for a phone link is _____.

tel:phone

The _____ element is part of the document head because it's not actually displayed as part of the web page, but rather appears externally within the browser tab.

title

Identify a grid-based property that is a space-separated list of row heights or column widths.

track-list

the apple logo would be considered a(n)______ copyright trademark service mark patent

trademark

Identify the syntax of the transform property.

transform: effect(params);

Identify the CSS3 3D transformation function that shifts an object offX pixels horizontally, offY pixels vertically, and offZ pixels along the z-axis.

translate3d(offX, offY, offZ)

A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate for the object-oriented programming language C/C++

true

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

true

A time bomb virus can be triggered on a certain date.

true

A worm does NOT require human interaction to spread to other computers.

true

DRM-free music can legally be moved from system to system

true

If a single value is specified in the background-position property, the browser applies that value to both the horizontal and vertical position.

true

Intangible personal property has no value.

true

Many cameras support wireless connections so you can transfer images without connecting cables.

true

Prolog is an example of a fourth-generation programming language.

true

RAW files are larger in size than JPEG files.

true

Second-generation languages are also known as assembly languages.

true

The background-position property is only useful for non-tiled images because a tiled image fills the background and it usually doesn't matter where the tiling starts.

true

The terms virus and worm mean the same thing.

true

When programmers need to create several different examples of a class, each is known as an object.

true

shield twisted pair cable

twisted pair cable that contains a layer of foil shielded to reduce interference

public key encryption

two keys are created one used for coding and other for decoding

Identify an attribute of the "a" element that indicates the media type of z linked document.

type="mime-type"

client/server network (server based network)

uses servers to deliver services to computers that are requesting them (clients)

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

internet exchange point

way of connecting internet service providers thats made up of one or more network switch where they connect

When does copyright protection begin? 1.When a work is created and fixed into a digital or physical form. 2.When the application for the copyright has been approved. 3.When a work is begun. 4.When the application for the copyright has been submitted.

when a work is created and fixed into a digital or physical form

data collision

when two computers send data at the same time and the sets of data collide somewhere

A(n) ______ includes the blank spaces, tabs, and line breaks found within the file.

white-space character

The style rule {color: blue;}uses the asterisk () selector-also known as the _____ selector-to select all elements in a document.

wildcard

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

worm

Which of the following is NOT true about e-books? you can annotate them with your own notes amazon sells more eBooks now than printed books they are always PDF file format you can borrow them from the library

you can borrow them from the library

Which of the following is NOT an example of a digital music file format? 1..wma 2..aac 3..mp3 4..accdb

.accdb

Identify the correct syntax for adding comments in style sheets.

/comment/

Which of the following rules defines character encoding in every Cascading Style Sheets (CSS) document?

@charset "encoding";

The Cascading Style Sheets (CSS) @rule that imports an external style sheet file located at ur1 is _____.

@import url(url);

Which of the following statements is true of outline styles?

All of the outline styles properties can be combined into the outline shorthand property.

While designing websites for mobile devices, _____ colors should be used so that pages are easily visible in outdoor lighting.

Contrasting

Which of the following methods is used to determine the day of the week on which a month starts?

Day;

Which of the following statements is true of adding adjacent borders, to a table, using CSS?

The border style with the highest priority is used if the two borders have the same width but different styles.

A background image can be placed using the keywords left, center, and right for the vertical position and top, center, and bottom for the horizontal position.

False

Which of the following is true of the default attribute when adding text tracks to a video file?

It enables the active track by marking it with the default attribute.

Identify a true statement about the figcaption element.

It is placed either directly before or directly after a figure box content.

Identify the use of the inset keyword used in the box-shadow property.

It is used to create an interior shadow.

In a form element, attributes specify how the form should be processed by the browser.

True

The radii of individual corners are equal to the radii of hypothetical circles placed at the corners of a box with the arcs of the circles defining the rounded circles.

True

The coordinates for the section element need not be defined as long as its position is set to _____.

Relative

Identify the default type for the background-repeat style.

Repeat

Tiling is when a browser loads a background image and then repeats the image in both the vertical and horizontal directions until the entire background is filled.

True

_____ measures the intensity of the chosen color and ranges from 0% (no color) up to 100% (full color).

Saturation

Identify the widget that limits a numeric field to a range of possible values by allowing users to drag a marker horizontally across the possible field values.

Slider control

If a single value is specified in the background-position property, the browser applies that value to both the horizontal and vertical position.

True

The most common character encoding in use is _____.

UTF-8

cascading style sheet

a list of rules that defines in one single location how to display HTML elements

Hypertext Transfer Protocol (HTTP)

allows files to be transferred from a wed server so that you see them on your computer by using a browser

To round off any of the four corners of a border, the _____ property should be applied.

border-radius

network adapter

device that enables a computer to communicate with the network using common data communication language

Viruses, adware and spyware are referred to collectively as ________.

grayware

_____ defines how solid a color appears.

opacity

token

special data packet used to pass data in a ring typology network

jam signal

special sinal sent to network nodes alerting them that a data collision has occurred

_____ measures the amount of space between words.

tracking

Which of the following is the default shape value for the radial-gradient function?

Ellipse

Identify the elements that are either nontextual or contain directives to a browser about how a page should be treated.

Empty elements

Identify a statement that is added to the first line of the file to run a script in strict mode.

"use strict";

Yellow has the RGB triplet _____.

(255, 255, 0)

Extensible Hypertext Markup Language (XHTML) version _____ is a reformulation of HTML 4.01 in the Extensible Markup language (XML) language in order to provide enforceable standards for HTML content and to allow HTML to interact with other XML languages.

1.0

All block elements, like the body element, have a default width of _____.

100%

Desktop layouts are often based on layouts with _____ columns.

12 or more

In the hexadecimal numbering system, the number 21 is expressed as _____.

15

Which of the following angles used in the filter function hue-rotate (angle) displays the complimentary colors?

180deg

Hypertext Markup language (HTML) version _____ added interactive elements, including web forms.

2.0

Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page layout and appearance.

4.01

To add the comment, Welcome John Smith, the syntax would be _____.

<!--Welcome John Smith -->

A sectioning element that marks content related to a main article is _____.

<aside>

Which of the following class names is used to indicate a column with a width of 25%?

<div class="col-1-4"></div>

Which of the following is an equivalent HTML element for display: table-cell; style?

<th>

Which of the following HTML elements is used to add a row in a table?

<tr>

_____ places an element at specific coordinates either in a page or within a container element.

Absolute positioning

Identify a Hypertext Markup Language (HTML) embedded element that contains programming scripts used to construct bitmap images and graphics.

Canvas

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

DDoS attack

A(n) ________ cable carries all audio and video information from devices to a connected TV.

HDMI

Graphic designers consider _____ easier to use because it allows them to set the initial color based on hue and then fine-tune the saturation and lightness values.

HSL

The _____ element, a Hypertext Markup Language (HTML) metadata element, contains a collection of metadata elements that describe the document or provide instructions to the browser.

Head

Identify a true statement of a JavaScript program in a web form.

JavaScript intercepts the content of the form before the browser attempts to contact the CGI script and report whether the data contained in the survey form has been correctly filled out or not.

A network confined to a small geographic area is referred to as a _____.

LAN (local area network)

Which of the following is true of transformations in three dimensions?

Negative values along the axes are to the left, up, and away from a reader.

internet protocol version 4

The original internet protocol addressing scheme (created in 1981)

An animation is limited to two style rules defined at the initial and end states.

True

Backgrounds are added in the reverse order in which they're listed in a style rule.

True

By default, items are placed in an array either in the order in which they are defined or explicitly by index number.

True

_____ are programs that test code to ensure that it contains no syntax errors.

Validators

Which of the following is an example of web safe font stacks?

Verdana

Web pages are seen within a window called the _____.

Viewport

Identify a relative unit in which lengths are expressed as a percentage of the width or height of a browser window.

Viewport unit

The totality of interconnected hypertext documents became known as the _____.

World Wide Web

________ enables users to define their own data-based tags and facilitates the exchange of information between websites.

XML

The _____ value of the overflow style keeps the element at a specified height and width, but cuts off excess content.

hidden

internet protocol

how all computers are connected to the internet

Identify a grouping element that marks a thematic break such as a scene change or transition to a new topic.

hr

Color values using the HSL model are described in Cascading Style Sheets (CSS) 3 using _____.

hsl (hue, saturation, lightness)

_____ is the tint of a color and is usually represented by a direction on a color wheel.

hue

Identify a text-level element that indicates a span of text that expresses an alternative voice or mood.

i

Two attributes, _____, are often key in targeting styles to specific elements.

id and class

In z-index: value; property, value is a(n) _____.

integer

internet protocol version 6

internet protocol addressing scheme that makes IP address longer

java script

internet protocol addressing scheme that makes IP addresses longer

Which is NOT a reason someone might risk violating a copyright?

its hard to prove the copyright in court

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

launch a DOS attack on your computer

Which of the following Hypertext Markup Language (HTML) grouping elements contains a single item from an ordered or unordered list?

li

_____ measures the brightness of a color and ranges from 0% (black) up to 100% (white).

lightness

The @import rule has the same impact as adding multiple _____ elements to a Hypertext Markup Language (HTML) file.

link

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

tunneling

main technology for achieving a virtual private network


Conjuntos de estudio relacionados

Sociology Ch. 9: Race and Ethnicity

View Set

Chapter 03: Concept Check Quiz, Practice, Video Quiz - Apple vs Samsung

View Set

OBGYN- Chapter 28: The Fetal Gastrointestinal System

View Set

Cities and Civilizations - History 2

View Set

Ch. 11 Drugs That Affect the Immune System

View Set