Which one of the following malware cnanot be include in the Greyware group of malicious software?
Which of the following is used to define the content of web pages?
Which of the following function converts an object value to a number?
The attributes and elements of XHTML are must be in ______
What is vishing in the modern information technology and computer era?
Encryption and decryption are functions of________
The ______ method submits data to be processed to a specified resource.
______________ is a collection of web pages and _______ is the very first page that we seen on opening of website.
Which property is very useful for getting or replacing the content of HTML elements?
A(n)________allows you to access your e-mail from anywhere.