Which of the following is the common name for the practice hackers use to trick people into revealing sensitive information?
Homer has been asked to create a monthly advertising message and send it by bulk e-mail to all e-mail addresses collected from customers who have purchased products from the company. What should Homer include in the bulk e-mail message to ensure customer privacy?
Suandi is documenting the technology choices of his Web development team. In the document, he explains his reasons for using JavaScript as a development language on the client side because:
The best use of an XHTML table is to:
David has designed a home page for an e-commerce Web site. At the left side of the page is a large block of text with product names and prices. The right side features a detailed 100-pixel-by-200-pixel photo of a sample product. David decides that his page appears to be balanced. How did the two elements balance each other?
Some of your site's users have called to complain that they do not understand the policy for shipping charges. Initially, the Web team created a pop-up window that appears at the point of purchase, designed to explain the shipping charge policy. Why did some of these users fail to get this message?