E-commerce 2015, MIS 395 at UIS Peoria, Test 2, Chapters 5-8 – Flashcards

Unlock all answers in this set

Unlock answers
question
________ is an industry-standard database query and manipulation language.
answer
SQL
question
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
answer
Availability
question
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
answer
Nonrepudiation
question
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
answer
Confidentiality
question
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
answer
Authenticity
question
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
answer
CRM system
question
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
answer
firewall
question
A digital certificate contains all of the following except the:
answer
subject's private key.
question
A recent Google survey found that ________ % of smartphone users visit a store within a day of conducting a local search.
answer
50
question
A social consequence of the richness of Internet information is:
answer
very persuasive messages might reduce the need for multiple independent sources of information.
question
A Web beacon is:
answer
a tiny graphics file embedded in an e-mail or Web page.
question
Accessing data without authorization on Dropbox is an example of which of the following?
answer
cloud security issue
question
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?
answer
cleared Web browser history and cookies
question
Acquisition rate is a measure of the:
answer
percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.
question
Ads that appear in a Facebook user's News Feed are called:
answer
Page Post Ads.
question
All of the following are examples of dark social except:
answer
tweets
question
All of the following are examples of malicious code except:
answer
sniffers.
question
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:
answer
free availability of the work on the Web.
question
All of the following are fixed price strategies except:
answer
yield management.
question
All of the following are limitations of the existing online credit card payment system except:
answer
cost to consumers.
question
All of the following are methods of securing channels of communication except:
answer
FTP.
question
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
answer
targeted banner ads.
question
All of the following are Pinterest marketing tools except:
answer
Promoted Accounts.
question
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
answer
up to ten years imprisonment for a first offense.
question
All of the following are traditional online marketing tools except:
answer
social marketing.
question
All of the following are used for authentication except:
answer
packet filters.
question
All of the following experienced high-profile data breaches in 2013 except:
answer
Sony.
question
All of the following marketing tools on Facebook require payment except:
answer
Brand Pages.
question
All of the following statements about Apple Pay are true except which of the following?
answer
Apple Pay is available for both iPhone 5s and iPhone 6s.
question
All of the following statements about cookies are true except:
answer
the data typically stored in cookies includes a unique ID and e-mail address.
question
All of the following statements about patents are true except:
answer
it is more difficult to obtain a copyright than it is to obtain a patent.
question
All of the following statements about PKI are true except:
answer
PKI guarantees that the verifying computer of the merchant is secure.
question
All of the following statements about public key cryptography are true except:
answer
public key cryptography ensures authentication of the sender.
question
All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
answer
the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
question
All of the following were popular types of online marketing before 2007 except:
answer
mobile marketing.
question
All the following statements about symmetric key cryptography are true except:
answer
symmetric key cryptography is computationally slower.
question
Amazon has a patent on:
answer
one-click purchasing.
question
An example of an online privacy violation is:
answer
your online purchasing history being sold to other merchants without your consent.
question
An intrusion detection system can perform all of the following functions except:
answer
blocking suspicious activity.
question
Apple's iBeacon uses which of the following technologies?
answer
BLE
question
Around ________ % of households in the United States have broadband access to the Internet.
answer
75
question
Bitcoins are an example of:
answer
digital cash.
question
Comcast's proposed merger with which of the following would make it the high-speed Internet provider for close to 40% of American homes?
answer
Time Warner Cable
question
Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
answer
13
question
Conversion rate is a measure of the:
answer
percentage of visitors who become customers.
question
Creating multiple variations of information goods and selling these to different market segments at different prices is called:
answer
versioning.
question
Disputes over federal trademarks involve establishing:
answer
infringement.
question
Do Not Track falls under which of the following principles in the FTC's new privacy framework?
answer
Simplified Choice
question
Dove's Real Beauty Sketches video ad is an example of which of the following?
answer
viral marketing
question
Downloading music tracks owned by record companies without paying for them is an example of a violation of:
answer
copyright law.
question
Encouraging users to click a Like button is an example of which step in the social marketing process?
answer
amplification
question
Facebook's share price fell dramatically after its IPO because investors feared that:
answer
Facebook would be unable to increase advertising revenues fast enough to justify its price.
question
For a Web site that has 10 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month.
answer
100 million
question
Google introduced which of the following changes to its search algorithm in 2011 to weed out low quality sites from search results?
answer
Panda
question
Google uses which of the following to build a global database of wireless access points and their geographic locations?
answer
Street View cars
question
Hits are a measure of the:
answer
number of http requests.
question
How can a smartphone's gyroscope and accelerometer be used in product marketing?
answer
to enhance user interaction with mobile multimedia
question
How does Google Analytics track user behavior at a participating Web site?
answer
beacons
question
How long does copyright protection extend for corporate-owned works?
answer
95 years
question
How many apps do users regularly use a month?
answer
25
question
How many retail-oriented apps are there in the top 25 apps?
answer
2
question
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:
answer
unique visitors.
question
Impressions are a measure of the:
answer
number of times an ad is served.
question
In 2013, the Target retail chain experienced which of the following?
answer
a large-scale data breach
question
In 2014, mobile marketing was about ________% of all online marketing.
answer
35%
question
In 2014, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education?
answer
75%
question
In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse?
answer
China
question
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
answer
knowledge consumers have about how to conduct online transactions.
question
In the first 8 months of 2014, the percentage of all e-mail that is spam averaged around ________ %.
answer
60
question
In the United States, the primary form of online payment is:
answer
PayPal.
question
In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?
answer
Alice Corporation Pty. Ltd. v. CLS Bank International
question
Linden Dollars, created for use in Second Life, are an example of:
answer
virtual currency.
question
Macy's deployed which of the following technologies in all its retail stores in 2014?
answer
iBeacon
question
Malware that comes with a downloaded file that a user requests is called a:
answer
drive-by download.
question
Most of the world's malware is delivered via which of the following?
answer
Trojan horses
question
Next generation firewalls provide all of the following except:
answer
the ability to automatically update applications with security patches
question
Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.
answer
more than 50%, less than 25%
question
PayPal is an example of what type of payment system?
answer
online stored value payment system
question
Physical retail goods accounted for around what percentage of m-commerce sales in 2014?
answer
85%
question
Pinterest's visitors are predominantly men.
answer
False
question
Privacy is sometimes confused with:
answer
confidentiality.
question
Proxy servers are also known as:
answer
dual home systems.
question
Purchasing an online ad on a CPA basis means that the advertiser:
answer
pays only for those users who perform a specific action, such as registering, purchasing, etc.
question
Recency refers to the:
answer
time elapsed since the last action taken by a customer.
question
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:
answer
cyberpiracy.
question
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
answer
cybersquatting.
question
Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:
answer
typosquatting.
question
Rustock is an example of which of the following?
answer
botnet
question
Shoppers constitute approximately ________ % of the online Internet audience.
answer
90
question
SMS text messaging generates the majority of mobile marketing spending.
answer
False
question
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
answer
spyware.
question
Symmetric key cryptography is also known as:
answer
secret key cryptography.
question
The Data Encryption Standard uses a(n) ________-bit key.
answer
56
question
The display of a third-party's Web site or page within your own Web site is called:
answer
framing.
question
The incremental cost of building the next unit of a good is called the:
answer
marginal cost.
question
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
answer
flash marketing
question
The Nike iD program is an example of which of the following marketing techniques?
answer
customer co-production
question
The number of people exposed to pins is a measure of which of the following?
answer
fan acquisition
question
The overall rate of online credit card fraud is ________ % of all online card transactions.
answer
less than 1
question
The President's Council of Advisors on Science and Technology has called for all of the following except:
answer
a blanket prohibition on commercial data brokers.
question
The ratio of impressions to fans is a measure of:
answer
fan acquisition.
question
The richness made possible by e-commerce technologies does which of the following?
answer
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
question
The second most popular social network in terms of average minutes per visitor is:
answer
Tumblr.
question
The sharing of a user's stored cookie information between Web sites and without the user's knowledge is:
answer
legal in the United States but illegal in Europe.
question
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
answer
an authorization management system.
question
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
answer
True
question
Uber has been criticized for using which of the following?
answer
surge pricing
question
View-through rate measures the ________ response rate to an ad.
answer
30-day
question
What is the first step in analyzing an ethical dilemma?
answer
Identify and describe the facts.
question
What is the first step in developing an e-commerce security plan?
answer
Perform a risk assessment.
question
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
answer
Require firms to have consumers affirmatively opt-in before PII is collected.
question
What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
answer
the ability to make perfect copies of digital works at little cost
question
What is the most frequent cause of stolen credit cards and card information today?
answer
the hacking and looting of corporate servers storing credit card information
question
Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising?
answer
Google Analytics
question
Which case was instrumental in paving the way for Internet business methods patents?
answer
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
question
Which dimension(s) of security is spoofing a threat to?
answer
integrity and authenticity
question
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
answer
No Free Lunch
question
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
answer
the Social Contract rule
question
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
answer
the Golden Rule
question
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?
answer
the Slippery Slope
question
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
answer
Risk Aversion
question
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
answer
the Collective Utilitarian principle
question
Which ethical principle tells you that it is wise to assume perfect information markets?
answer
the New York Times test
question
Which of the following accounts for the most mobile ad spending?
answer
search engine advertising
question
Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers?
answer
Like button
question
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
answer
patent law
question
Which of the following are features of both Pinterest and Twitter?
answer
hashtags
question
Which of the following basic ethical concepts plays an important role in defining privacy?
answer
due process
question
Which of the following can be used to record all keyboard activity of a user?
answer
spyware
question
Which of the following categories do people most use their mobile devices for?
answer
entertainment
question
Which of the following dimensions of e-commerce security is not provided for by encryption?
answer
availability
question
Which of the following do Facebook users spend the most time on?
answer
News Feed
question
Which of the following earns the most location-based marketing revenue?
answer
Google
question
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
answer
social technology
question
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
answer
global reach
question
Which of the following examples illustrates the "Long Tail" phenomenon?
answer
Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.
question
Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed?
answer
information density
question
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
answer
universal standards
question
Which of the following forms of online advertising is expected to grow the fastest between 2014 and 2018?
answer
rich media
question
Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?
answer
WIPO
question
Which of the following involves a coupon or other promotional offer that appears in users' Twitter timeline?
answer
Lead Generation Card
question
Which of the following is a core Fair Information Practices (FIP) principle?
answer
Choice/Consent
question
Which of the following is a history of your actions on Facebook?
answer
Timeline
question
Which of the following is a prominent hacktivist group?
answer
Anonymous
question
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
answer
NFC
question
Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?
answer
the CAS
question
Which of the following is an example of an integrity violation of e-commerce security?
answer
An unauthorized person intercepts an online communication and changes its contents.
question
Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
answer
Curalate
question
Which of the following is another term for amplification?
answer
reach
question
Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next 5 years?
answer
location-based mobile marketing
question
Which of the following is not a feature that is driving the growth of social marketing and advertising?
answer
affiliate programs
question
Which of the following is not a key point of vulnerability when dealing with e-commerce?
answer
the credit card companies
question
Which of the following is not a major provider of mobile display advertising?
answer
Webtrends
question
Which of the following is not a major trend in e-commerce payments in 2014-2015?
answer
Mobile retail payment volume decreases.
question
Which of the following is not a practice that degrades the results and usefulness of search engines?
answer
social search
question
Which of the following is not a primary source of ad fraud?
answer
native advertising that is displayed on a social media site
question
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
answer
the E-Government Act
question
Which of the following is not an example of a PUP?
answer
drive-by download
question
Which of the following is not an example of an access control?
answer
digital signatures
question
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
answer
privacy
question
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
answer
Nielsen ratings
question
Which of the following is not one of the issues complicating the taxation of e-commerce sales?
answer
Taxes raised are used for different government purposes.
question
Which of the following is not one of the main stages of the online purchasing process?
answer
conversation
question
Which of the following is not true about Facebook News Feed Page Post Ads?
answer
They cannot contain links.
question
Which of the following is not true about mobile marketing?
answer
People use most of their mobile minutes while they are on the go.
question
Which of the following is not true about search engine advertising?
answer
Search engine advertising is the fastest growing type of online advertising.
question
Which of the following is not true about social marketing?
answer
More than 50% of Twitter's ad revenues are generated by desktop users.
question
Which of the following is the current standard used to protect Wi-Fi networks?
answer
WPA2
question
Which of the following is the first step in the social marketing process?
answer
fan acquisition
question
Which of the following is the leading cause of data breaches?
answer
hackers
question
Which of the following is the most important tool in establishing a relationship with the customer?
answer
company Web site
question
Which of the following is the most popular use for mobile devices?
answer
entertainment
question
Which of the following is the top app in terms of both audience size and share of time spent?
answer
Facebook
question
Which of the following is the top reason why consumers choose the online channel?
answer
lower prices
question
Which of the following measures the average length of stay at a Web site?
answer
stickiness
question
Which of the following measures the ratio of items purchased to product views?
answer
browse-to-buy ratio
question
Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses?
answer
establishing customer needs and habits as the top priority in all marketing decisions
question
Which of the following online advertising formats attracted the least amount of spending in 2014?
answer
e-mail
question
Which of the following protects original forms of expression in a tangible medium?
answer
copyright law
question
Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
answer
Amplify
question
Which of the following purchased Tumblr in May 2013?
answer
Yahoo
question
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
answer
Gramm-Leach-Bliley Act
question
Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a key word?
answer
Hummingbird
question
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
answer
A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
question
Which of the following statements about a free pricing strategy is false?
answer
Correct The free pricing strategy was born in the early days of the Web.
question
Which of the following statements about Canada's anti-spam law is not true?
answer
The law has no impact on companies located within the United States.
question
Which of the following statements about CAN-SPAM is not true?
answer
CAN-SPAM prohibits unsolicited e-mail (spam).
question
Which of the following statements about Graph Search is not true?
answer
It relies on Google to supplement its search results.
question
Which of the following statements about industry self-regulation regarding privacy is not true?
answer
The NAI's privacy policies have established the TRUSTe seal.
question
Which of the following statements about Pinterest is not true?
answer
Pinterest is the only one of the major social networks that does not accept paid advertising.
question
Which of the following statements about the Internet's impact on marketing is not true?
answer
The Internet has decreased the impact of brands.
question
Which of the following statements is not true?
answer
Google is the leading display ad site on mobile devices.
question
Which of the following statements is not true?
answer
The only way to access Facebook from a mobile device is to use a mobile app.
question
Which of the following technologies allows you to send e-mail without a trace?
answer
anonymous remailers
question
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?
answer
search engines
question
Which of the following was the object of the FTC's first-ever COPPA enforcement action involving mobile apps?
answer
W3 Innovation
question
Which of the following would you implement to collect and analyze your company's Big Data?
answer
Hadoop
question
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
answer
Notice/Awareness
question
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
answer
Choice/Consent
question
Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate?
answer
highway pricing
question
Which social marketing proved the most effective for ExchangeHunterJumper.com?
answer
Facebook
question
Your Facebook News Feed includes all of the following except:
answer
tweets.
question
Zeus is an example of which of the following?
answer
Trojan horse
question
A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.
answer
FALSE
question
A Trojan horse appears to be benign, but then does something other than expected.
answer
TRUE
question
A worm needs to be activated by a user in order for it to replicate itself.
answer
FALSE
question
An ad is considered viewable if half of the ad can be viewed for at least one second.
answer
TRUE
question
Apple Pay uses near field communication (NFC) chips.
answer
TRUE
question
Brand pages on Facebook typically attract more visitors than a brand's Web site.
answer
TRUE
question
Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.
answer
TRUE
question
By 2014, spending on social marketing will be more than double the amount spent on mobile marketing.
answer
FALSE
question
Consumers tend to look at native ads more frequently than they look at display ads.
answer
TRUE
question
Cookies, when combined with Web beacons, can be used to create cross-site profiles.
answer
TRUE
question
Copyright protection protects against others copying the underlying ideas in a work.
answer
FALSE
question
Credit cards are the dominant form of online payment throughout the world.
answer
FALSE
question
CryptoLocker is an example of ransomware.
answer
TRUE
question
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
answer
FALSE
question
Evidence suggests that real-time customer chat lowers shopping cart abandonment rates.
answer
TRUE
question
Facebook does not sell display ads.
answer
FALSE
question
Google defended its Library Project on the grounds of fair use.
answer
TRUE
question
Google provides the leading location-based marketing platform.
answer
TRUE
question
In 2013, local online marketing was almost three times the amount of mobile marketing.
answer
TRUE
question
In 2014, mobile marketing grew at nearly the same rate as traditional online marketing.
answer
FALSE
question
In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage.
answer
FALSE
question
In the United States, Google is required to remove results from its search engine if requested.
answer
FALSE
question
It is expected that by 2018, mobile commerce will account for almost 30% of all B2C e-commerce.
answer
TRUE
question
It is possible to opt-out of Facebook's Graph Search.
answer
FALSE
question
Lead generation marketing firms specialize in inbound marketing.
answer
TRUE
question
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
answer
TRUE
question
Most adult social network participants do not have any expectation of personal privacy when using a social network.
answer
FALSE
question
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
answer
TRUE
question
Online gambling is now legal throughout the United States.
answer
FALSE
question
Online shoppers tend to search for specific products they have determined in advance.
answer
TRUE
question
Online traffic is driven by offline brands and shopping.
answer
TRUE
question
Over 60% of Facebook's ad revenue is generated by its mobile audience.
answer
TRUE
question
Phishing attacks rely on browser parasites.
answer
FALSE
question
Promoted Tweets are Twitter's version of Google's Ad Words.
answer
TRUE
question
Research has found that of all the standard formats of display ads, leaderboard ads are the most effective at getting and holding a user's attention.
answer
TRUE
question
Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
answer
TRUE
question
Section 230 of the Communications Decency Act (CDA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
answer
FALSE
question
SLS/TLS provides irrefutability.
answer
FALSE
question
Smishing attacks exploit SMS messages.
answer
TRUE
question
Social media influence is an important factor in why consumers choose the online channel.
answer
FALSE
question
Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.
answer
TRUE
question
Tablets are the fastest growing and largest source of mobile commerce revenues.
answer
TRUE
question
The AdChoices program is an industry-sponsored initiative to encourage Web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
answer
TRUE
question
The Children's Internet Protection Act (CIPA) prohibits Web sites from collecting information on children under the age of 13.
answer
FALSE
question
The concept of "customer satisfaction" is broader than the concept of "customer experience."
answer
FALSE
question
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
answer
TRUE
question
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
answer
TRUE
question
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
answer
TRUE
question
The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of copyright protection.
answer
FALSE
question
The Heartbleed bug is an example of a software vulnerability.
answer
TRUE
question
The Java Runtime Environment is a frequent target of exploit kits.
answer
TRUE
question
The opt-out model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
answer
FALSE
question
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
answer
FALSE
question
There is a finite number of Bitcoins that can be created.
answer
TRUE
question
Traditional desktop marketing remains the largest part of all online marketing.
answer
TRUE
question
Transaction logs are built into Web server software.
answer
TRUE
question
Visitors spend significantly more time on Facebook than any other social network site.
answer
TRUE
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New