Answer:
(C) progressive enhancement
Explanation:
Progressive enhancement is a web design technique that first underlines the main functionality web page and then incorporates increasingly enhanced and advanced features and design levels.
This process enables the users to use and access the basic features of the web pages. These users can use any browser to access the main contents of the web page. Progressive Enhancement also offers an advanced version of the website for those with more advanced and sophisticated computer browsers or faster internet connection.
So the user can access basic features of a web sites as well as the complex features. This process first makes sure the basic intended purpose and main contents of the web site is accessible to all users before adding complex features which are supported by different browsers and devices.
Validation is a process which checks that code of the website is as per the world wide web standards and also checks that content of web pages and design of websites is being properly displayed and the site is accessible. So this is not the correct option.
Technique of altering a web site in a way that it can appear higher in the search engine results is called optimization so this is not a correct option.
Answer:
Parameter
Explanation:
A parameter is a variable/argument of a function that are placed between the parentheses in the function's definition.
Hope this is clear :)
Answer:
1. True
2. True
3. False
4. False
Explanation:
1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.
The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.
Hence, it helps to ensure that data can be modified only by appropriate mechanism.
2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.
3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.
4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.
False......................
Driving is considered a privilege because you have to be a certain age to start driving and be able to drive by yourself legally. Driving can be dangerous if you are not a safe driver and if you do illegal things while behind the wheel. Driving is also a privilege because you have to be responsible when driving, because the people that are around you or with you, their lives are in your hands.
Your answer is: You need to carry the responsibility of being safe and not harming yourself or others.
Have an amazing day!