E-commerce 2015, MIS 395 at UIS Peoria, Test 2, Chapters 5-8

question

SQL
answer

________ is an industry-standard database query and manipulation language.
question

Availability
answer

________ refers to the ability to ensure that an e-commerce site continues to function as intended.
question

Nonrepudiation
answer

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
question

Confidentiality
answer

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
question

Authenticity
answer

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
question

CRM system
answer

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
question

firewall
answer

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
question

subject’s private key.
answer

A digital certificate contains all of the following except the:
question

50
answer

A recent Google survey found that ________ % of smartphone users visit a store within a day of conducting a local search.
question

very persuasive messages might reduce the need for multiple independent sources of information.
answer

A social consequence of the richness of Internet information is:
question

a tiny graphics file embedded in an e-mail or Web page.
answer

A Web beacon is:
question

cloud security issue
answer

Accessing data without authorization on Dropbox is an example of which of the following?
question

cleared Web browser history and cookies
answer

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?
question

percentage of visitors who indicate an interest in a site’s products by registering or visiting a product’s pages.
answer

Acquisition rate is a measure of the:
question

Page Post Ads.
answer

Ads that appear in a Facebook user’s News Feed are called:
question

tweets
answer

All of the following are examples of dark social except:
question

sniffers.
answer

All of the following are examples of malicious code except:
question

free availability of the work on the Web.
answer

All of the following are factors that will be considered in determining whether use of copyrighted material is \”fair use\” except the:
question

yield management.
answer

All of the following are fixed price strategies except:
question

cost to consumers.
answer

All of the following are limitations of the existing online credit card payment system except:
question

FTP.
answer

All of the following are methods of securing channels of communication except:
question

targeted banner ads.
answer

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
question

Promoted Accounts.
answer

All of the following are Pinterest marketing tools except:
question

up to ten years imprisonment for a first offense.
answer

All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:
question

social marketing.
answer

All of the following are traditional online marketing tools except:
question

packet filters.
answer

All of the following are used for authentication except:
question

Sony.
answer

All of the following experienced high-profile data breaches in 2013 except:
question

Brand Pages.
answer

All of the following marketing tools on Facebook require payment except:
question

Apple Pay is available for both iPhone 5s and iPhone 6s.
answer

All of the following statements about Apple Pay are true except which of the following?
question

the data typically stored in cookies includes a unique ID and e-mail address.
answer

All of the following statements about cookies are true except:
question

it is more difficult to obtain a copyright than it is to obtain a patent.
answer

All of the following statements about patents are true except:
question

PKI guarantees that the verifying computer of the merchant is secure.
answer

All of the following statements about PKI are true except:
question

public key cryptography ensures authentication of the sender.
answer

All of the following statements about public key cryptography are true except:
question

the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
answer

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
question

mobile marketing.
answer

All of the following were popular types of online marketing before 2007 except:
question

symmetric key cryptography is computationally slower.
answer

All the following statements about symmetric key cryptography are true except:
question

one-click purchasing.
answer

Amazon has a patent on:
question

your online purchasing history being sold to other merchants without your consent.
answer

An example of an online privacy violation is:
question

blocking suspicious activity.
answer

An intrusion detection system can perform all of the following functions except:
question

BLE
answer

Apple’s iBeacon uses which of the following technologies?
question

75
answer

Around ________ % of households in the United States have broadband access to the Internet.
question

digital cash.
answer

Bitcoins are an example of:
question

Time Warner Cable
answer

Comcast’s proposed merger with which of the following would make it the high-speed Internet provider for close to 40% of American homes?
question

13
answer

Companies are not permitted to collect personal information from children under the age of ________ without parental consent.
question

percentage of visitors who become customers.
answer

Conversion rate is a measure of the:
question

versioning.
answer

Creating multiple variations of information goods and selling these to different market segments at different prices is called:
question

infringement.
answer

Disputes over federal trademarks involve establishing:
question

Simplified Choice
answer

Do Not Track falls under which of the following principles in the FTC’s new privacy framework?
question

viral marketing
answer

Dove’s Real Beauty Sketches video ad is an example of which of the following?
question

copyright law.
answer

Downloading music tracks owned by record companies without paying for them is an example of a violation of:
question

amplification
answer

Encouraging users to click a Like button is an example of which step in the social marketing process?
question

Facebook would be unable to increase advertising revenues fast enough to justify its price.
answer

Facebook’s share price fell dramatically after its IPO because investors feared that:
question

100 million
answer

For a Web site that has 10 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month.
question

Panda
answer

Google introduced which of the following changes to its search algorithm in 2011 to weed out low quality sites from search results?
question

Street View cars
answer

Google uses which of the following to build a global database of wireless access points and their geographic locations?
question

number of http requests.
answer

Hits are a measure of the:
question

to enhance user interaction with mobile multimedia
answer

How can a smartphone’s gyroscope and accelerometer be used in product marketing?
question

beacons
answer

How does Google Analytics track user behavior at a participating Web site?
question

95 years
answer

How long does copyright protection extend for corporate-owned works?
question

25
answer

How many apps do users regularly use a month?
question

2
answer

How many retail-oriented apps are there in the top 25 apps?
question

unique visitors.
answer

If you want to determine the size of your Web site’s audience, the metric you will use for the most accurate measurement will be:
question

number of times an ad is served.
answer

Impressions are a measure of the:
question

a large-scale data breach
answer

In 2013, the Target retail chain experienced which of the following?
question

35%
answer

In 2014, mobile marketing was about ________% of all online marketing.
question

75%
answer

In 2014, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education?
question

China
answer

In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse?
question

knowledge consumers have about how to conduct online transactions.
answer

In modeling online consumer behavior, the concept of \”consumer skills\” refers to the:
question

60
answer

In the first 8 months of 2014, the percentage of all e-mail that is spam averaged around ________ %.
question

PayPal.
answer

In the United States, the primary form of online payment is:
question

Alice Corporation Pty. Ltd. v. CLS Bank International
answer

In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?
question

virtual currency.
answer

Linden Dollars, created for use in Second Life, are an example of:
question

iBeacon
answer

Macy’s deployed which of the following technologies in all its retail stores in 2014?
question

drive-by download.
answer

Malware that comes with a downloaded file that a user requests is called a:
question

Trojan horses
answer

Most of the world’s malware is delivered via which of the following?
question

the ability to automatically update applications with security patches
answer

Next generation firewalls provide all of the following except:
question

more than 50%, less than 25%
answer

Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.
question

online stored value payment system
answer

PayPal is an example of what type of payment system?
question

85%
answer

Physical retail goods accounted for around what percentage of m-commerce sales in 2014?
question

False
answer

Pinterest’s visitors are predominantly men.
question

confidentiality.
answer

Privacy is sometimes confused with:
question

dual home systems.
answer

Proxy servers are also known as:
question

pays only for those users who perform a specific action, such as registering, purchasing, etc.
answer

Purchasing an online ad on a CPA basis means that the advertiser:
question

time elapsed since the last action taken by a customer.
answer

Recency refers to the:
question

cyberpiracy.
answer

Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:
question

cybersquatting.
answer

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
question

typosquatting.
answer

Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:
question

botnet
answer

Rustock is an example of which of the following?
question

90
answer

Shoppers constitute approximately ________ % of the online Internet audience.
question

False
answer

SMS text messaging generates the majority of mobile marketing spending.
question

spyware.
answer

Software that is used to obtain private user information such as a user’s keystrokes or copies of e-mail is referred to as:
question

secret key cryptography.
answer

Symmetric key cryptography is also known as:
question

56
answer

The Data Encryption Standard uses a(n) ________-bit key.
question

framing.
answer

The display of a third-party’s Web site or page within your own Web site is called:
question

marginal cost.
answer

The incremental cost of building the next unit of a good is called the:
question

flash marketing
answer

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
question

customer co-production
answer

The Nike iD program is an example of which of the following marketing techniques?
question

fan acquisition
answer

The number of people exposed to pins is a measure of which of the following?
question

less than 1
answer

The overall rate of online credit card fraud is ________ % of all online card transactions.
question

a blanket prohibition on commercial data brokers.
answer

The President’s Council of Advisors on Science and Technology has called for all of the following except:
question

fan acquisition.
answer

The ratio of impressions to fans is a measure of:
question

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
answer

The richness made possible by e-commerce technologies does which of the following?
question

Tumblr.
answer

The second most popular social network in terms of average minutes per visitor is:
question

legal in the United States but illegal in Europe.
answer

The sharing of a user’s stored cookie information between Web sites and without the user’s knowledge is:
question

an authorization management system.
answer

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
question

True
answer

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
question

surge pricing
answer

Uber has been criticized for using which of the following?
question

30-day
answer

View-through rate measures the ________ response rate to an ad.
question

Identify and describe the facts.
answer

What is the first step in analyzing an ethical dilemma?
question

Perform a risk assessment.
answer

What is the first step in developing an e-commerce security plan?
question

Require firms to have consumers affirmatively opt-in before PII is collected.
answer

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
question

the ability to make perfect copies of digital works at little cost
answer

What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
question

the hacking and looting of corporate servers storing credit card information
answer

What is the most frequent cause of stolen credit cards and card information today?
question

Google Analytics
answer

Which analytics tool did Fairmont Hotel use to measure the effectiveness of its online marketing and advertising?
question

State Street Bank & Trust Co. v. Signature Financial Group, Inc.
answer

Which case was instrumental in paving the way for Internet business methods patents?
question

integrity and authenticity
answer

Which dimension(s) of security is spoofing a threat to?
question

No Free Lunch
answer

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
question

the Social Contract rule
answer

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
question

the Golden Rule
answer

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
question

the Slippery Slope
answer

Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?
question

Risk Aversion
answer

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
question

the Collective Utilitarian principle
answer

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
question

the New York Times test
answer

Which ethical principle tells you that it is wise to assume perfect information markets?
question

search engine advertising
answer

Which of the following accounts for the most mobile ad spending?
question

Like button
answer

Which of the following allows Facebook to track user behavior on other sites and then sell the information to marketers?
question

patent law
answer

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
question

hashtags
answer

Which of the following are features of both Pinterest and Twitter?
question

due process
answer

Which of the following basic ethical concepts plays an important role in defining privacy?
question

spyware
answer

Which of the following can be used to record all keyboard activity of a user?
question

entertainment
answer

Which of the following categories do people most use their mobile devices for?
question

availability
answer

Which of the following dimensions of e-commerce security is not provided for by encryption?
question

News Feed
answer

Which of the following do Facebook users spend the most time on?
question

Google
answer

Which of the following earns the most location-based marketing revenue?
question

social technology
answer

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
question

global reach
answer

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
question

Over 50% of Netflix’s 100,000 titles are rented at least once a day by someone.
answer

Which of the following examples illustrates the \”Long Tail\” phenomenon?
question

information density
answer

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers’ real-time behavior to be gathered and analyzed?
question

universal standards
answer

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
question

rich media
answer

Which of the following forms of online advertising is expected to grow the fastest between 2014 and 2018?
question

WIPO
answer

Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?
question

Lead Generation Card
answer

Which of the following involves a coupon or other promotional offer that appears in users’ Twitter timeline?
question

Choice/Consent
answer

Which of the following is a core Fair Information Practices (FIP) principle?
question

Timeline
answer

Which of the following is a history of your actions on Facebook?
question

Anonymous
answer

Which of the following is a prominent hacktivist group?
question

NFC
answer

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
question

the CAS
answer

Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?
question

An unauthorized person intercepts an online communication and changes its contents.
answer

Which of the following is an example of an integrity violation of e-commerce security?
question

Curalate
answer

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media?
question

reach
answer

Which of the following is another term for amplification?
question

location-based mobile marketing
answer

Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next 5 years?
question

affiliate programs
answer

Which of the following is not a feature that is driving the growth of social marketing and advertising?
question

the credit card companies
answer

Which of the following is not a key point of vulnerability when dealing with e-commerce?
question

Webtrends
answer

Which of the following is not a major provider of mobile display advertising?
question

Mobile retail payment volume decreases.
answer

Which of the following is not a major trend in e-commerce payments in 2014-2015?
question

social search
answer

Which of the following is not a practice that degrades the results and usefulness of search engines?
question

native advertising that is displayed on a social media site
answer

Which of the following is not a primary source of ad fraud?
question

the E-Government Act
answer

Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?
question

drive-by download
answer

Which of the following is not an example of a PUP?
question

digital signatures
answer

Which of the following is not an example of an access control?
question

privacy
answer

Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
question

Nielsen ratings
answer

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
question

Taxes raised are used for different government purposes.
answer

Which of the following is not one of the issues complicating the taxation of e-commerce sales?
question

conversation
answer

Which of the following is not one of the main stages of the online purchasing process?
question

They cannot contain links.
answer

Which of the following is not true about Facebook News Feed Page Post Ads?
question

People use most of their mobile minutes while they are on the go.
answer

Which of the following is not true about mobile marketing?
question

Search engine advertising is the fastest growing type of online advertising.
answer

Which of the following is not true about search engine advertising?
question

More than 50% of Twitter’s ad revenues are generated by desktop users.
answer

Which of the following is not true about social marketing?
question

WPA2
answer

Which of the following is the current standard used to protect Wi-Fi networks?
question

fan acquisition
answer

Which of the following is the first step in the social marketing process?
question

hackers
answer

Which of the following is the leading cause of data breaches?
question

company Web site
answer

Which of the following is the most important tool in establishing a relationship with the customer?
question

entertainment
answer

Which of the following is the most popular use for mobile devices?
question

Facebook
answer

Which of the following is the top app in terms of both audience size and share of time spent?
question

lower prices
answer

Which of the following is the top reason why consumers choose the online channel?
question

stickiness
answer

Which of the following measures the average length of stay at a Web site?
question

browse-to-buy ratio
answer

Which of the following measures the ratio of items purchased to product views?
question

establishing customer needs and habits as the top priority in all marketing decisions
answer

Which of the following most helped Dagny Aslin of ExchangeHunterJumper.com in establishing her brand in the niche area of selling high-end competition horses?
question

e-mail
answer

Which of the following online advertising formats attracted the least amount of spending in 2014?
question

copyright law
answer

Which of the following protects original forms of expression in a tangible medium?
question

Amplify
answer

Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand?
question

Yahoo
answer

Which of the following purchased Tumblr in May 2013?
question

Gramm-Leach-Bliley Act
answer

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
question

Hummingbird
answer

Which of the following search engine algorithm updates enables Google’s search engine to evaluate an entire sentence rather than just a key word?
question

A student copies a photograph of his favorite band from a Web site created by the band’s record label and places it on the student’s personal Web site.
answer

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
question

Correct The free pricing strategy was born in the early days of the Web.
answer

Which of the following statements about a free pricing strategy is false?
question

The law has no impact on companies located within the United States.
answer

Which of the following statements about Canada’s anti-spam law is not true?
question

CAN-SPAM prohibits unsolicited e-mail (spam).
answer

Which of the following statements about CAN-SPAM is not true?
question

It relies on Google to supplement its search results.
answer

Which of the following statements about Graph Search is not true?
question

The NAI’s privacy policies have established the TRUSTe seal.
answer

Which of the following statements about industry self-regulation regarding privacy is not true?
question

Pinterest is the only one of the major social networks that does not accept paid advertising.
answer

Which of the following statements about Pinterest is not true?
question

The Internet has decreased the impact of brands.
answer

Which of the following statements about the Internet’s impact on marketing is not true?
question

Google is the leading display ad site on mobile devices.
answer

Which of the following statements is not true?
question

The only way to access Facebook from a mobile device is to use a mobile app.
answer

Which of the following statements is not true?
question

anonymous remailers
answer

Which of the following technologies allows you to send e-mail without a trace?
question

search engines
answer

Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?
question

W3 Innovation
answer

Which of the following was the object of the FTC’s first-ever COPPA enforcement action involving mobile apps?
question

Hadoop
answer

Which of the following would you implement to collect and analyze your company’s Big Data?
question

Notice/Awareness
answer

Which of the FTC’s Fair Information Practices (FIP) principles requires identification of the collector of data?
question

Choice/Consent
answer

Which of the FTC’s Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?
question

highway pricing
answer

Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate?
question

Facebook
answer

Which social marketing proved the most effective for ExchangeHunterJumper.com?
question

tweets.
answer

Your Facebook News Feed includes all of the following except:
question

Trojan horse
answer

Zeus is an example of which of the following?
question

FALSE
answer

A cell phone’s GPS is accurate to within 5 feet of the actual location of the phone.
question

TRUE
answer

A Trojan horse appears to be benign, but then does something other than expected.
question

FALSE
answer

A worm needs to be activated by a user in order for it to replicate itself.
question

TRUE
answer

An ad is considered viewable if half of the ad can be viewed for at least one second.
question

TRUE
answer

Apple Pay uses near field communication (NFC) chips.
question

TRUE
answer

Brand pages on Facebook typically attract more visitors than a brand’s Web site.
question

TRUE
answer

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product’s individual prices.
question

FALSE
answer

By 2014, spending on social marketing will be more than double the amount spent on mobile marketing.
question

TRUE
answer

Consumers tend to look at native ads more frequently than they look at display ads.
question

TRUE
answer

Cookies, when combined with Web beacons, can be used to create cross-site profiles.
question

FALSE
answer

Copyright protection protects against others copying the underlying ideas in a work.
question

FALSE
answer

Credit cards are the dominant form of online payment throughout the world.
question

TRUE
answer

CryptoLocker is an example of ransomware.
question

FALSE
answer

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
question

TRUE
answer

Evidence suggests that real-time customer chat lowers shopping cart abandonment rates.
question

FALSE
answer

Facebook does not sell display ads.
question

TRUE
answer

Google defended its Library Project on the grounds of fair use.
question

TRUE
answer

Google provides the leading location-based marketing platform.
question

TRUE
answer

In 2013, local online marketing was almost three times the amount of mobile marketing.
question

FALSE
answer

In 2014, mobile marketing grew at nearly the same rate as traditional online marketing.
question

FALSE
answer

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage.
question

FALSE
answer

In the United States, Google is required to remove results from its search engine if requested.
question

TRUE
answer

It is expected that by 2018, mobile commerce will account for almost 30% of all B2C e-commerce.
question

FALSE
answer

It is possible to opt-out of Facebook’s Graph Search.
question

TRUE
answer

Lead generation marketing firms specialize in inbound marketing.
question

TRUE
answer

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
question

FALSE
answer

Most adult social network participants do not have any expectation of personal privacy when using a social network.
question

TRUE
answer

Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
question

FALSE
answer

Online gambling is now legal throughout the United States.
question

TRUE
answer

Online shoppers tend to search for specific products they have determined in advance.
question

TRUE
answer

Online traffic is driven by offline brands and shopping.
question

TRUE
answer

Over 60% of Facebook’s ad revenue is generated by its mobile audience.
question

FALSE
answer

Phishing attacks rely on browser parasites.
question

TRUE
answer

Promoted Tweets are Twitter’s version of Google’s Ad Words.
question

TRUE
answer

Research has found that of all the standard formats of display ads, leaderboard ads are the most effective at getting and holding a user’s attention.
question

TRUE
answer

Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
question

FALSE
answer

Section 230 of the Communications Decency Act (CDA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
question

FALSE
answer

SLS/TLS provides irrefutability.
question

TRUE
answer

Smishing attacks exploit SMS messages.
question

FALSE
answer

Social media influence is an important factor in why consumers choose the online channel.
question

TRUE
answer

Spoofing involves attempting to hide a true identity by using someone else’s e-mail or IP address.
question

TRUE
answer

Tablets are the fastest growing and largest source of mobile commerce revenues.
question

TRUE
answer

The AdChoices program is an industry-sponsored initiative to encourage Web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
question

FALSE
answer

The Children’s Internet Protection Act (CIPA) prohibits Web sites from collecting information on children under the age of 13.
question

FALSE
answer

The concept of \”customer satisfaction\” is broader than the concept of \”customer experience.\”
question

TRUE
answer

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
question

TRUE
answer

The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
question

TRUE
answer

The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
question

FALSE
answer

The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of copyright protection.
question

TRUE
answer

The Heartbleed bug is an example of a software vulnerability.
question

TRUE
answer

The Java Runtime Environment is a frequent target of exploit kits.
question

FALSE
answer

The opt-out model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
question

FALSE
answer

The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
question

TRUE
answer

There is a finite number of Bitcoins that can be created.
question

TRUE
answer

Traditional desktop marketing remains the largest part of all online marketing.
question

TRUE
answer

Transaction logs are built into Web server software.
question

TRUE
answer

Visitors spend significantly more time on Facebook than any other social network site.

Get instant access to
all materials

Become a Member