Web Development and Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

To create an internal link in a Web page, the value of the href attribute includes the named anchor preceded by a ________.

# symbol

The code ½ will produce which fraction?

1/2

Text put between the ________ tags appears in the browser's title bar (i.e., the dark bar at the top of the browser window).

<title></title>

An unordered list is created using which notation?

<ul>

Today, virtually all new major operating systems are written in:

C or C++

Which of the following statements is false?

Client-side programming technologies are used to build applications that are run on the server

________ with JavaScript can be used to validate user input, to interact with the browser, to enhance web pages, and to add client/server communication between a browser and a web server.

Client-side scripting

The term Web 2.0 was coined by ________ in 2003.

Dale Dougherty

Which of the following is most closely associated with Moore's Law?

Every year or two, the capacities of computers have approximately doubled without any increase in price

Each computer on the Internet has a unique ________.

IP address

Which of the following is the most accurate statement concerning internal hyperlinks?

Internally-linked location names can be assigned to any point in an HTML5 file

The latest IP standard is ________.

Internet Protocol version 6 (IPv6)

Which of the following languages was designed to enable the writing of programs that will run on a great variety of computer systems and computer-controlled devices?

Java

The ________ standard specifies data formats, which programs can use to interpret data correctly.

Multipurpose Internet Mail Extensions (MIME)

Which of the following is a server-side programming technology used to build web pages?

PHP

________ is a technique in which digital data is sent in small bundles that contain address, error-control and sequencing information.

Packet switching

Web technologies standardized by the W3C are called ________.

Recommendations

The protocol for communicating over the ARPANET became known as ________.

TCP (Transmission Control Protocol)

Which statement is false?

The del element is used to delete text.

________ founded the World Wide Web Consortium (W3C)—devoted to developing nonproprietary, interoperable technologies for the World Wide Web.

Tim Berners-Lee

URL is an acronym for which of the following?

Uniform Resource Locator

Which language was developed by Microsoft in the early 1990's to simplify the development of Windows applications?

Visual Basic

Which of the following statements is false?

Windows is an open source operating system

The ________ allows people worldwide to donate their unused computer-processing power, harnessing unused capacity.

World Community Grid

In the statement <a href = "address">, href is a(n) ________ of the a element.

attribute

The smallest data item in a computer, called a ________, can assume the value 0 or the value 1.

bit

In multitier applications, the ________ maintains the application's data.

bottom tier (also called the data tier or the information tier)

The middle-tier ________ processes client requests (such as requests to view a product catalog) and retrieves data from the database.

controller logic

A ________ is an electronic collection of data that's organized for easy access and manipulation.

database

Which of the following accurately describes the select element?

drop-down list

HTML5 text is marked up with ________, delimited by ________ that are keywords contained in pairs of ________.

elements, tags, angle brackets

A ________ is a group of characters or bytes that conveys meaning.

field

The two most common HTTP request types (also known as request methods) are ________ and ________.

get, post

The _____ displays the smallest heading on a web page.

h6

The alt attribute is used in a(n) ________ element to provide an alternate ________ description for the image.

img, text

Each list item in an unordered list is delineated by the ________ element.

li

A link to an e-mail address is created using the notation <a href = "________">Paul</a>.

mailto:emailAddress

HTML (HyperText Markup Language) is a special type of computer language called a(n) ________ language designed to specify the content and structure of web pages (also called documents) in a portable manner.

markup

A ________ is an applications-development methodology in which you can rapidly develop powerful and intriguing applications by combining (often free) complementary web services and other forms of information feeds.

mashup

Web-based applications are often multitier applications, sometimes referred to as ________ applications.

n-tier

Two important attributes of the meta element are ________, which identifies the type of meta element and ________, which provides the information search engines use to catalog pages.

name, content

The ? in the URL www.google.com/search?q=deitel separates the ________ from the rest of the URL in a request.

query string

One major use for the meta element is related to which of the following?

search engines

The location of an image is specified in the img element's _______ attribute.

src

HTML5 documents are edited using a(n) ________.

text editor

Where is a table's summary displayed?

the summary is not displayed

An HTML5 table contains rows delimited by ________ elements, which contain cells delimited by ________ elements.

tr, td

When the user clicks a hyperlink, a ________ locates the requested web page and sends it to the user's web browser.

web server

Machines called ________ store HTML5 documents.

web servers

________ models software in terms similar to those that people use to describe real-world objects.

Object-oriented design


Set pelajaran terkait

Mike Holy Shit That Was an Unnecessarily Large Assignment 250

View Set

Implementing Security in the Systems and Software Development Lifecycle

View Set

Kress- Entrepreneurship/ small business test 2

View Set

Unit 9: Lesson 1 - Organic Chemistry

View Set

FIN 443 Enterprise Risk Management: Module 4 Study Guide Questions

View Set

EBP| ch 9, 13, 14, 15, 16, 17, 18

View Set