cis 150 final :)
Identify a contextual selector that matches any element.
*
Which of the following is true of the plug-in approach to deliver multimedia content?
A plug-in requires users to install a separate application in addition to their web browsers.
In the context of hypertext attribute, identify a target name that opens the page in the current window or tab.
_self
token metod
access method used to pass data in a ring typology network
extranet
area of the internet that only certain corporations pr people can access
brute force attack
attempt to access an account by repeatedly trying different passwords
Identify the property that can be used to change the definition of an element's background.
background-clip: type;
Which of the following styles is used to specify the type of tiling to be applied to a background image, or even turn off tiling?
background-repeat: type;
point of presence
bank of modems servers reputes and switches through which internet users connect to an internet service provider
Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.
beta
The _____ grouping element contains content that is quoted from another source, often with a citation and often indented on a page.
blockquote
The width property of the _____ model is based on the sum of the content, padding, and border spaces and any space taken up by the padding and border is subtracted from space given to the content.
border box
Identify the property that is used to apply a border image.
border-image: url(url) slice repeat;
Which of the following properties is used to define the thickness of a specific border?
border-side-width: width;
Identify the property that is used to choose the layout model.
box-sizing
twisted pair cable
cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket
scalability
characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes
centralized
characteristic of client/server networks where the sever coordinates data security
decentralized
characteristic of peer to peer networks where the individual user coordinates data security
ring typology
circle of data that flows around the circle from device to device in 1 direction
Identify an attribute selector that recognizes groups of elements that share a similar characteristic or property.
class
In a two-sided tag, a(n) _____ tag indicates the content's end.
closing
To set the foreground or text color of an element, use the following property:
color: color;
honey pot
computer system thats set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something valuable
Creating and distributing ________ is one of the most widespread types of cybercrimes.
computer viruses
commerce server
computers that host software that enables users to buy goods and services over the web
Identify the default type for the box-sizing property.
content-box
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
control structures
Which of the following defines the default hotspot for an image?
coords="0,0,width,height"
Identify the coordinate attribute for the rectangular hotspots of an image.
coords="left,top,right,bottom"
To protect a movie, what category of intellectual property would be used?
copyright
JavaScript is used as a programming tool for:
creating interactive web forms and animated graphics.
Using your computer for non-work activities while you are being paid to work is known as ________.
cyberloafing
switch
device for transmitting data on a network. makes decisions and addresses it
terminator
device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it
Access card reader
device that reads info from a magnetic strop on the back of a credit card-like access card
biometric authentication device
device that uses some unique characteristic of human biology to identify authorized users
bridge
device used to send data two different collision domains in a network
________ allows only limited use of media that has been legally purchased.
digital rights management
Identify the attribute selector that matches all div elements whose class attribute begins with the text string "col-".
div[class^="col-"]
root DNS server
domain name system serve that contains the laster listings for an entire top-level domain
_____ is a popular design element which consists of an enlarged initial letter in a body of text that drops down into the text body.
drop cap
Which of the following style rules is used to draw a 1px red dotted line around every element on a web page along with a wildcard selector?
*{outline: 1px dotted red;}
Which of the following attribute selectors selects all elem elements whose att attribute ends with text?
elem[att$="text"]
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
Hypertext Transfer Protocol Secure (HTTPS)
ensures data is secure
A copyright holder cannot loan, rent, or give away the work.
false
A data-flow diagram provides a visual representation of an algorithm.
false
A denial-of-service attack can be used to deny hackers access to a computer system
false
A stealth virus is designed to infect multiple file types to fool the antivirus software.
false
An encryption virus replicates itself onto a hard drive's master boot record.
false
Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks.
false
Currently, there are no antivirus programs for mobile devices.
false
Ethical hackers are also known as white-hat hackers.
false
If a background extends through the border space by default, all coordinates for the image position are measured from the bottom-left corner.
false
Pictures you find on the Google image search are considered in the public domain.
false
Syntax errors are caught only when a program executes.
false
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
false
YouTube is the entity legally responsible for its content, rather than the person who uploaded the content
false
The _____ element is used to contain an image file and can also be used to mark any page content that should stand apart from the main content of an article.
figure
A final way to alter an object is through a Cascading Style Sheets (CSS) _____.
filter
Which of the following provides a visual representation of the patterns of an algorithm?
flowchart
A _____ sets the width of page elements as a percent of the available screen width.
fluid layout
Which of the following would NOT be used to build websites with interactive capabilities?
fortran
The _____ unit can be thought of as a share of available space.
fr
Identify a compare function that sorts numeric values in ascending order.
function ascending(a, b) {return a - b;}
Once a Cascading Style Sheets (CSS) grid is established, a specific element within a _____ is placed at the intersection of a specified row and column.
grid cell
frame
groups of data packets are sent together in a package
packet screening
having an external screening router examine incoming data packets to make sure they are legit
The _____ element, a Hypertext Markup Language (HTML) metadata element, contains a collection of metadata elements that describe the document or provide instructions to the browser.
head
bastion host
heavily secured server
access method
method to control which computer is allowed to use transmission media at a certain time
CSMA/CD
method used on ethernet networks to avoid data collisions
Identify a generic font group that is a typeface in which each character has the same width.
monospace
star typology
most widely deployed client/server network topology where nodes connect to a central communications device called a switch in a star pattern
Identify an expression that defines a date object.
new Date("month day, year hrs:mins:secs");
passive typology
nodes do nothing to move data along the network
active typology
nodes participate in moving dada thru the network
Identify the default clear value that allows an element to be displayed alongside any floated objects.
none
The _____ value of the display style removes an element from a rendered page.
none
Which is NOT a key factor a programmer uses in selecting the language for a project?
number of inputs required
possessed object
object that users carry to identify themselves and that grants them access to a computer system or facility
A(n) _____ is a line drawn around an element, enclosing the element content, padding, and border spaces.
outline
The scroll value of the overflow style keeps the element at the specified dimensions, but adds horizontal and vertical scroll bars to allow users to scroll through the _____ content.
overflowed
Which of the following digital image formats compresses the image file?
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
pharming
network typology
physical or logical arrangement of computers transmission media and other network components
A(n) _____ represents a single dot on an output device.
pixel
In a fixed layout, the size of the page and the size of the page elements are fixed using _____ as the unit of measure.
pixels
Regarding computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
Inline styles are styles applied directly to specific elements using the style attribute<element style="property: value"> content </element>where element is the Hypertext Markup Language (HTML) element and _____ defines the styles that are applied directly to that element.
property: value
simple mail transfer protocol (SMTP)
protocol responsible for sending email along the internet to its destination
A popular programming language which is known for having a large number of free libraries is ________.
python
transmission media
radio waves or the physical system that transports data on a network
Which of the following can be used to express style in the outline-style property outline-style: style;?
ridge
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
rootkit
The display type value _____ is displayed as a block unless its next sibling is also a block, in which case, it is displayed in-line, essentially combining the two blocks into one.
run-in
server-side program
runs on a web serve rather than on a computer
Identify a CSS3 2D transformation function that resizes an object by a factor of x horizontally.
scaleY(y)
Hypertext Markup Language (HTML) sectioning elements are also known as _____ because the tag name describes the purpose of the element and the type of content it contains.
semantic elements
A typeface in which a small ornamentation appears at the tail end of each character is _____.
serif
proxy server
server that acts as a go between connecting computers on the internal network with those on the external network
application server
server that acts as a repository for application software
authentication server
server that keeps track of who is logging onto the network and which serves on the network are available to each user
database server
server that provides client computers with access to info stored in databases
protocol
set of rules for exchanging communication
coaxial cable
single copper wire surrounded by layers of plastic installation metal sheathing and a plastic jacket used in cable tv and internet service
applet
small application located on a server, when it is requested the applet is downloaded to the client
device driver
software that facilitates the communication between the device and its operating system or between s network adapter an a servers operating system
network operating system
software that handles requests for info internet access and the use of peripherals
In the outline-style propertyoutline-style: style;style can be set to _____ for displaying a single line.
solid
Filter functions can be combined in a _____ to create new effects.
space-separated list
wireless network interface card
special network adapter card that allows a computing device to connect to a network using wireless access
When a doctype is present, browsers will render the page in _____ mode, employing the most current specifications of Hypertext markup Language (HTML).
standards
Browsers ignore any values specified for the left or top properties under _____ positioning.
static
An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a process known as _____.
style inheritance
The exact appearance of each page is described in a separate document known as a ______.
style sheet
bus typology
system of networking connections in which all devices are connected in sequence on a single cable
The Uniform Resource Locator (URL) for a phone link is _____.
tel:phone
The _____ element is part of the document head because it's not actually displayed as part of the web page, but rather appears externally within the browser tab.
title
Identify a grid-based property that is a space-separated list of row heights or column widths.
track-list
the apple logo would be considered a(n)______ copyright trademark service mark patent
trademark
Identify the syntax of the transform property.
transform: effect(params);
Identify the CSS3 3D transformation function that shifts an object offX pixels horizontally, offY pixels vertically, and offZ pixels along the z-axis.
translate3d(offX, offY, offZ)
A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate for the object-oriented programming language C/C++
true
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
true
A time bomb virus can be triggered on a certain date.
true
A worm does NOT require human interaction to spread to other computers.
true
DRM-free music can legally be moved from system to system
true
If a single value is specified in the background-position property, the browser applies that value to both the horizontal and vertical position.
true
Intangible personal property has no value.
true
Many cameras support wireless connections so you can transfer images without connecting cables.
true
Prolog is an example of a fourth-generation programming language.
true
RAW files are larger in size than JPEG files.
true
Second-generation languages are also known as assembly languages.
true
The background-position property is only useful for non-tiled images because a tiled image fills the background and it usually doesn't matter where the tiling starts.
true
The terms virus and worm mean the same thing.
true
When programmers need to create several different examples of a class, each is known as an object.
true
shield twisted pair cable
twisted pair cable that contains a layer of foil shielded to reduce interference
public key encryption
two keys are created one used for coding and other for decoding
Identify an attribute of the "a" element that indicates the media type of z linked document.
type="mime-type"
client/server network (server based network)
uses servers to deliver services to computers that are requesting them (clients)
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
internet exchange point
way of connecting internet service providers thats made up of one or more network switch where they connect
When does copyright protection begin? 1.When a work is created and fixed into a digital or physical form. 2.When the application for the copyright has been approved. 3.When a work is begun. 4.When the application for the copyright has been submitted.
when a work is created and fixed into a digital or physical form
data collision
when two computers send data at the same time and the sets of data collide somewhere
A(n) ______ includes the blank spaces, tabs, and line breaks found within the file.
white-space character
The style rule {color: blue;}uses the asterisk () selector-also known as the _____ selector-to select all elements in a document.
wildcard
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
worm
Which of the following is NOT true about e-books? you can annotate them with your own notes amazon sells more eBooks now than printed books they are always PDF file format you can borrow them from the library
you can borrow them from the library
Which of the following is NOT an example of a digital music file format? 1..wma 2..aac 3..mp3 4..accdb
.accdb
Identify the correct syntax for adding comments in style sheets.
/comment/
Which of the following rules defines character encoding in every Cascading Style Sheets (CSS) document?
@charset "encoding";
The Cascading Style Sheets (CSS) @rule that imports an external style sheet file located at ur1 is _____.
@import url(url);
Which of the following statements is true of outline styles?
All of the outline styles properties can be combined into the outline shorthand property.
While designing websites for mobile devices, _____ colors should be used so that pages are easily visible in outdoor lighting.
Contrasting
Which of the following methods is used to determine the day of the week on which a month starts?
Day;
Which of the following statements is true of adding adjacent borders, to a table, using CSS?
The border style with the highest priority is used if the two borders have the same width but different styles.
A background image can be placed using the keywords left, center, and right for the vertical position and top, center, and bottom for the horizontal position.
False
Which of the following is true of the default attribute when adding text tracks to a video file?
It enables the active track by marking it with the default attribute.
Identify a true statement about the figcaption element.
It is placed either directly before or directly after a figure box content.
Identify the use of the inset keyword used in the box-shadow property.
It is used to create an interior shadow.
In a form element, attributes specify how the form should be processed by the browser.
True
The radii of individual corners are equal to the radii of hypothetical circles placed at the corners of a box with the arcs of the circles defining the rounded circles.
True
The coordinates for the section element need not be defined as long as its position is set to _____.
Relative
Identify the default type for the background-repeat style.
Repeat
Tiling is when a browser loads a background image and then repeats the image in both the vertical and horizontal directions until the entire background is filled.
True
_____ measures the intensity of the chosen color and ranges from 0% (no color) up to 100% (full color).
Saturation
Identify the widget that limits a numeric field to a range of possible values by allowing users to drag a marker horizontally across the possible field values.
Slider control
If a single value is specified in the background-position property, the browser applies that value to both the horizontal and vertical position.
True
The most common character encoding in use is _____.
UTF-8
cascading style sheet
a list of rules that defines in one single location how to display HTML elements
Hypertext Transfer Protocol (HTTP)
allows files to be transferred from a wed server so that you see them on your computer by using a browser
To round off any of the four corners of a border, the _____ property should be applied.
border-radius
network adapter
device that enables a computer to communicate with the network using common data communication language
Viruses, adware and spyware are referred to collectively as ________.
grayware
_____ defines how solid a color appears.
opacity
token
special data packet used to pass data in a ring typology network
jam signal
special sinal sent to network nodes alerting them that a data collision has occurred
_____ measures the amount of space between words.
tracking
Which of the following is the default shape value for the radial-gradient function?
Ellipse
Identify the elements that are either nontextual or contain directives to a browser about how a page should be treated.
Empty elements
Identify a statement that is added to the first line of the file to run a script in strict mode.
"use strict";
Yellow has the RGB triplet _____.
(255, 255, 0)
Extensible Hypertext Markup Language (XHTML) version _____ is a reformulation of HTML 4.01 in the Extensible Markup language (XML) language in order to provide enforceable standards for HTML content and to allow HTML to interact with other XML languages.
1.0
All block elements, like the body element, have a default width of _____.
100%
Desktop layouts are often based on layouts with _____ columns.
12 or more
In the hexadecimal numbering system, the number 21 is expressed as _____.
15
Which of the following angles used in the filter function hue-rotate (angle) displays the complimentary colors?
180deg
Hypertext Markup language (HTML) version _____ added interactive elements, including web forms.
2.0
Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page layout and appearance.
4.01
To add the comment, Welcome John Smith, the syntax would be _____.
<!--Welcome John Smith -->
A sectioning element that marks content related to a main article is _____.
<aside>
Which of the following class names is used to indicate a column with a width of 25%?
<div class="col-1-4"></div>
Which of the following is an equivalent HTML element for display: table-cell; style?
<th>
Which of the following HTML elements is used to add a row in a table?
<tr>
_____ places an element at specific coordinates either in a page or within a container element.
Absolute positioning
Identify a Hypertext Markup Language (HTML) embedded element that contains programming scripts used to construct bitmap images and graphics.
Canvas
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
DDoS attack
A(n) ________ cable carries all audio and video information from devices to a connected TV.
HDMI
Graphic designers consider _____ easier to use because it allows them to set the initial color based on hue and then fine-tune the saturation and lightness values.
HSL
The _____ element, a Hypertext Markup Language (HTML) metadata element, contains a collection of metadata elements that describe the document or provide instructions to the browser.
Head
Identify a true statement of a JavaScript program in a web form.
JavaScript intercepts the content of the form before the browser attempts to contact the CGI script and report whether the data contained in the survey form has been correctly filled out or not.
A network confined to a small geographic area is referred to as a _____.
LAN (local area network)
Which of the following is true of transformations in three dimensions?
Negative values along the axes are to the left, up, and away from a reader.
internet protocol version 4
The original internet protocol addressing scheme (created in 1981)
An animation is limited to two style rules defined at the initial and end states.
True
Backgrounds are added in the reverse order in which they're listed in a style rule.
True
By default, items are placed in an array either in the order in which they are defined or explicitly by index number.
True
_____ are programs that test code to ensure that it contains no syntax errors.
Validators
Which of the following is an example of web safe font stacks?
Verdana
Web pages are seen within a window called the _____.
Viewport
Identify a relative unit in which lengths are expressed as a percentage of the width or height of a browser window.
Viewport unit
The totality of interconnected hypertext documents became known as the _____.
World Wide Web
________ enables users to define their own data-based tags and facilitates the exchange of information between websites.
XML
The _____ value of the overflow style keeps the element at a specified height and width, but cuts off excess content.
hidden
internet protocol
how all computers are connected to the internet
Identify a grouping element that marks a thematic break such as a scene change or transition to a new topic.
hr
Color values using the HSL model are described in Cascading Style Sheets (CSS) 3 using _____.
hsl (hue, saturation, lightness)
_____ is the tint of a color and is usually represented by a direction on a color wheel.
hue
Identify a text-level element that indicates a span of text that expresses an alternative voice or mood.
i
Two attributes, _____, are often key in targeting styles to specific elements.
id and class
In z-index: value; property, value is a(n) _____.
integer
internet protocol version 6
internet protocol addressing scheme that makes IP address longer
java script
internet protocol addressing scheme that makes IP addresses longer
Which is NOT a reason someone might risk violating a copyright?
its hard to prove the copyright in court
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
launch a DOS attack on your computer
Which of the following Hypertext Markup Language (HTML) grouping elements contains a single item from an ordered or unordered list?
li
_____ measures the brightness of a color and ranges from 0% (black) up to 100% (white).
lightness
The @import rule has the same impact as adding multiple _____ elements to a Hypertext Markup Language (HTML) file.
link
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
tunneling
main technology for achieving a virtual private network