3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following technologies can be used to create rollover images without the use of special plug-ins?
Which of the following is used in Secure XML to verify the origin of a message?
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:
Kylee is creating a Flash animation banner. The banner is advertising a company's change of ownership. In the banner, the old company logo needs to morph into the new logo. What is the best way for Kylee to do this?
Kristi is developing a Web site for Roscoe Carnival Supplies. Roscoe's CEO has provided several JPG images that he wants to include on the home page of the site. As Kristi begins to design the page, she realizes that she cannot achieve the tight design she wants because many of the images have excess white space around them. What should Kristi do to solve the problem?
You are creating a Web site that uses a gradient fill for all page backgrounds on a site. To ensure that you can see the gradient through the image background, you should:
When you publish a Flash file, Flash generates the HTML code for inserting an object in a Web page. Which of the following code fragments indicates the correct attributes that identify a SWF file within the
Which of the following is one of the advantages that SWF (Flash) files bring to Web-based environments?
Susan is creating some additional images for her customer's Web site. One image will be used repeatedly on site pages. However, in order to support the site's topic-specific color scheme, she wants one shape in the image's background to be a different color on each page. What is the best way for Susan to accomplish this task?
Some of your site's users have called to complain that they do not understand the policy for shipping charges. Initially, the Web team created a pop-up window that appears at the point of purchase, designed to explain the shipping charge policy. Why did some of these users fail to get this message?
Which of the following plug-ins would be used to view paper-based documents that cannot be easily re-created using XHTML?
Which of the following techniques helps stop a denial-of-service (DOS) attack in which an attacker has sent multiple ICMP or TCP packets to crash a Web server on the Internet?
Jared is creating an interactive Web site that is expected to respond to heavy traffic. He needs to request new hardware in order to build a staging server. What requirement of the staging server should he be aware of when ordering the new hardware?
You have been asked to create a page that retrieves information from a database. Which of the following is the first step in obtaining information from a database from a Web page?
You want to provide your visitors with Web pages that look good and perform well on many browsers and platforms. Accessibility and conformance to W3C standards are critical. Using a WYSIWYG editor, what would be the most appropriate positioning method and font choice for page elements on the site template?
You have been asked to transfer print copy to a Web page. Which of the following is a commonly accepted rule concerning white space in this situation?
Which of the following would typically be found in the contents of an external style sheet?
You are working for a financial services company. The company has a Web site that allows its customers to review their statements online. Your Web site uses the Document Object Model (DOM), ActiveX, JavaScript and Java. Which of these technologies is most likely to cause customers problems with their browsers when they try to access information?
Marcus is designing a site and wants to use a ready-made template from a Web development application. One consequence of using predesigned templates is that:
During a project meeting, Eric explains the need for a development server to host the company's new Web site during development. Eric's IT co-workers want to know who will have access to the development server. What should Eric tell them?
Which Web development team member is responsible for developing a site's navigation?
Manuel has been hired by XYZ Corporation to develop a Web site that will display information about the company's products and in-stock quantities to potential customers. The company currently has more than 1,000 products in its catalog. Which approach is best for providing Web site customers with the necessary information?
Which of the following best describes the type of information that Web server log files can collect?
Bi-directional text is a function of CSS2. What is the importance of this function?
Kim is using a proprietary HTML application to create code for a Web page. Currently, the application is set to use HTML 4.01, according to a request from Kim's supervisor. Kim wants the code to be as XHTML-compliant as possible, in case of an upgrade. Which of the following should she do?
Consider the following code:
$dbcon=mysql_connect("james.stangernet.com","example");
mysql_select_db("databaseone");
Which of the following describes the function of this code?
A recent trend in Web content is to allow computer systems to exchange information and share functionality with one another using well-defined protocols and compatible languages.This functionality is referred to as:
Tom is making changes to his company's Web site. Because he likes the way the markup is styled, he copies the following into another section of the page:
Why does the home page not validate properly?