The use of <span>different control features in the design of the user interface are : </span>Menu bar - displays the main options at the top of the screen.
Toolbar - contains icons that represent shortcuts for executing common commands.
Command button - start an action such as printing a form or requesting Help.
Dialog box - allows a user to enter information about a task that the system will perform.
Text box - display messages or provide a place for a user to enter data.
Toggle button - is used to represent on or off status — clicking the toggle button switches to the other status.
List box - displays a list of choices that the user can select.
Scroll bar - allows the user to move through the available choices.
Drop-down list box - displays the current selection; when the user clicks the arrow, a list of the available choices displays.
Option button - represent groups of options. The user can select only one option at a time; selected options contain a black dot.
Answer:
2. testing cybersquatting
Explanation:
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. In this case, phishing domain refer to a domain that is not a trustworthy one but try to deceive user into using it in place of the genuine domain.
Cybersquatting also known as domain squatting is registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.
Identity theft is the illegal use of someone else's personal information in order to obtain money or credit. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
From the above definition, it is seen that someone registering a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit is called testing cybersquatting.
Answer:
True
Explanation:
The readers need to know the aspects of the topic that will broaden their knowledge and idea. So when designing a web page it is very good to provide extensive content such as hyperlinks to related articles on the same topic. To broaden their reading scope.
However this should be done cautiously, not to provide facets that will end up distracting the importance and the core aspect of the main topic.
<span>NCP are protocols that are used for establishing PPP sessions. </span>During the establishment of a PPP connection that will use the IPv4 network layer protocol the following options are negotiated: the algorithm to compress TCP and IP headers and the IPv4 address used for routing IP over the PPP link.
Answer:
The correct answer to this question is option (1).
Explanation:
Let x1 = Is number of pages that printer A can print in page/minute.
thus x1 + 5 = Is number of page that printer B can print in page/minute.
As printer A finishes his work in 60 min. So the task has 60x1 pages. As printers A and B both finish that task in 24 minutes. So the equation can be given as:
60x1 = 24x1 + 24(x1 + 5)
60x1 = 24x1 + 24x1 + 120
60x1=48x1 + 120
60x1-48x1=120
12x1=120
x1=120/12
x1=10
put the value of x1 in to (60x1). Therefore, the task has 60(10) = 600 pages. the task contains 600 pages.
So the answer to this question is option (1).