Which of the following describes the function of this code?
Consider the following code:
$dbcon=mysql_connect("james.stangernet.com","example"); mysql_select_db("databaseone");
Which of the following describes the function of this code?
Which of the following tags must she alter on each page?
Alma has been asked to upgrade the pages on her Web site to XHTML 1.0 Transitional. Which of the following tags must she alter on each page?
Which of the following best describes the type of visual balance Reba plans to use?
Reba has been hired to design a Web site for a manufacturer of digital pianos. She plans to build a site that uses visual elements and white space to create an attractive, usable source of information for prospective customers. To ensure visual balance and effective usability on the company’s home page, Reba decides to place a large picture with a dark background on the right side of the page, and to add a vertical menu of navigational links to the left side. Which of the following best describes the type of visual balance Reba plans to use?
What is the fastest method to accomplish this task?
Sandra needs to check the hyperlinks on her company’s Web site to verify that the URLs are still valid. What is the fastest method to accomplish this task?
How can Serena best incorporate her message so that it is most effective?
A company Web site sells auto parts using a red, white and blue color scheme. Serena, an employee, has been asked to add a message on the home page announcing the availability of new brake pads. How can Serena best incorporate her message so that it is most effective?
What should be done to ensure that the site meets the college’s strict accessibility policy?
A college is considering allowing podcasting on its student Web site. What should be done to ensure that the site meets the college’s strict accessibility policy?
Which of the following will best protect a server from Web server vulnerabilities that are exploited by hacker
Which of the following will best protect a server from Web server vulnerabilities that are exploited by hackers?
What is another name for the staging server?
What is another name for the staging server?
In using this technique, what must he remember to do?
Jay is about to integrate animation into his Web site. He has decided that using shape tweening is the most dynamic technique with which to begin. In using this technique, what must he remember to do?
Which of the following plug-ins would be used to view paper-based documents that cannot be easily re-created u
Which of the following plug-ins would be used to view paper-based documents that cannot be easily re-created using XHTML?