Navigation bars are easy to construct using the ____ symbol on your keyboard to separate one link from the next.
A. separator
B. divider
C. discriminator
D. pipe
Answer: D
You might also like to view...
The __________ used a buffer overflow exploit in “fingerd” as one of its attack mechanisms.
A. Code Red Worm B. Sasser Worm C. Morris Internet Worm D. Slammer Worm
Master/slave multiprocessor organizations __________.
a) exhibit high fault tolerance b) enable many processors to execute the operating system, reducing the likelihood that contention will build up for operating system resources. c) exploit hardware asymmetry (e.g., if one processor is more powerful than other processors) and known parallelism in computationally-intensive tasks. d) exhibit high scalability, where adding a processor increases the system throughput by the new processor’s rated capacity.