Which one of the following services provides that proof?
The OSI/RM describes five security services. One of them allows you to prove that a transaction
occurred. Which one of the following services provides that proof?
Which tag demonstrates the proper yntax you should use in a <META> tag to embed this information in your
You want users to be able to find your Web site if they enter the words CIW certified into a search
engine. Which tag demonstrates the proper yntax you should use in a <META> tag to embed this
information in your Web page?
What is a cookie?
What is a cookie?
Which of the following is an example of a browser plug-in?
Which of the following is an example of a browser plug-in?
where must the CGI script reside?
Sally created a form that will collect data for a marketing survey. She configured the ACTION
attribute with a CGI pointer. In order to correctly process this form, where must the CGI script
reside?
what does the hash symbol (#) mean?
Consider the following HTML code:
<IMG SRC=”FaceImage.gif” USEMAP=”#FaceMap”>
In this code, what does the hash symbol (#) mean?
SET and SSL are two protocols you might use if you are:
SET and SSL are two protocols you might use if you are:
Which hyperlink would successfully connect the user to www.cnn.com?
Which hyperlink would successfully connect the user to www.cnn.com?
which item?
According to the HTML 4.0 Recommendation, an HTML tag can consist of several items, all of
which are contained within angle brackets (<and >). The main instruction of an HTML tag is
usually contained in which item?
Which Uniform Resource Locator (URL) is a fully qualified URL?
Which Uniform Resource Locator (URL) is a fully qualified URL?