Question 15 which of the following will help protect

This preview shows page 8 - 14 out of 19 pages.

Question 15 Which of the following will help protect you from phishing? Open attachments only when you know who sent them and why. Pay attention to the domain name of the company. Only give information online when you have initiated the transaction yourself by going to the company site. All of the above
All of the above. Please review textbook pp.337 for more information on phishing. 1 / 1 pts Question 16 HTML tags are words enclosed in ( )
1 / 1 pts Question 17 Which of the following is the 2nd project we did in this CSE180 course?
The 2nd project is the HTML web page design project. 1 / 1 pts Question 18 Cookies:
1 / 1 pts Question 19 An algorithm must contain a loop. True False
While many algorithms do, there are algorithms that don't contain loops. 1 / 1 pts Question 20
1 / 1 pts Question 21 Social networking:
all of the above All of the above are attributes of social networking. 1 / 1 pts Question 22 In computer display, to represent the color of a single pixel requires three bytes.
1 / 1 pts Question 23 To get an image to sit on the left side of the window with the text filling the area to the right of the image, your HTML tag would need to look like <img src = "sample.jpg" align = "left" /> <img src align = "sample.jpg" "left" /> <img = "sample.jpg" align = "left" /> <img "sample.jpg" aligh src = "left" />
The correct tag should be: &lt;img src = "sample.jpg" align = "left" /&gt;
1 / 1 pts

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture