An example of a(n) ________ URL is: /images/recipes/monkeybread.jpg

A) inactive B) relative C) absolute D) secure

B

Computer Science & Information Technology

You might also like to view...

What is a flaw or weakness that allows a threat agent to bypass security?

A. risk B. vulnerability C. asset D. threat

Computer Science & Information Technology

What is the appropriate term for when a gradient shows every step from black to white?

A. knocking B. stair-stepping C. push-stepping D. showing steps

Computer Science & Information Technology