Navigation bars are easy to construct using the ____ symbol on your keyboard to separate one link from the next.

A. separator
B. divider
C. discriminator
D. pipe

Answer: D

Computer Science & Information Technology

You might also like to view...

The __________ used a buffer overflow exploit in “fingerd” as one of its attack mechanisms.

A. Code Red Worm B. Sasser Worm C. Morris Internet Worm D. Slammer Worm

Computer Science & Information Technology

Master/slave multiprocessor organizations __________.

a) exhibit high fault tolerance b) enable many processors to execute the operating system, reducing the likelihood that contention will build up for operating system resources. c) exploit hardware asymmetry (e.g., if one processor is more powerful than other processors) and known parallelism in computationally-intensive tasks. d) exhibit high scalability, where adding a processor increases the system throughput by the new processor’s rated capacity.

Computer Science & Information Technology