An example of a(n) ________ URL is: /images/recipes/monkeybread.jpg
A) inactive B) relative C) absolute D) secure
B
Computer Science & Information Technology
You might also like to view...
What is a flaw or weakness that allows a threat agent to bypass security?
A. risk B. vulnerability C. asset D. threat
Computer Science & Information Technology
What is the appropriate term for when a gradient shows every step from black to white?
A. knocking B. stair-stepping C. push-stepping D. showing steps
Computer Science & Information Technology