Question 81
Web ____ caters to user-generated content.
a. |
1.5 |
|
b. |
1.0 |
|
c. |
4.0 |
|
d. |
2.0 |
1 points
Question 82
Webpages secured by SSL have URLs that begin with ____.
a. |
SSL:// |
|
b. |
IETF:// |
|
c. |
S-http:// |
|
d. |
https:// |
1 points
Question 83
When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ____.
a. |
newsreader |
|
b. |
news widget |
|
c. |
news catcher |
|
d. |
news group |
1 points
Question 84
Which of the following is NOT an example of pull technology?
a. |
newsgroups |
|
b. |
online social networks |
|
c. |
podcasts |
|
d. |
mailing lists |
1 points
Question 85
Which of the following is NOT an example of push technology?
a. |
online social networks |
|
b. |
video-sharing sites |
|
c. |
instant messaging |
|
d. |
mashups |
1 points
Question 86
Which of the following is an example of a newsfeed using pull technology?
a. |
|
|
b. |
|
|
c. |
Usenet |
|
d. |
Google Chat |
1 points
Question 87
Windows Live Messenger has been replaced with _____.
a. |
AIM |
|
b. |
Skype |
|
c. |
Yahoo! Messenger |
|
d. |
ICQ |
1 points
Question 88
You can listen to or watch a podcast on a _____.
a. |
computer |
|
b. |
smartphone |
|
c. |
tablet |
|
d. |
all of the above |
1 points
Question 89
YouTube was started in ____ as a private venture.
a. |
2003 |
|
b. |
2005 |
|
c. |
2001 |
|
d. |
2007 |
1 points
Question 90
____ allows users to send very short messages to others who are connected to the network using smartphones or other Internet devices.
a. |
Text messaging |
|
b. |
Podcasting |
|
c. |
Posting |
|
d. |
Email messaging |
1 points
Question 91
____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables.
a. |
Clickstream |
|
b. |
Static |
|
c. |
Graphic |
|
d. |
Active content |
1 points
Question 92
____ encryption uses a single key that both the sender and receiver know.
a. |
Private-key |
|
b. |
Asymmetric |
|
c. |
Man-in-the-Middle |
|
d. |
Public-key |
1 points
Question 93
____ is a general category of software that includes advertisements to pay for the product for which it appears.
a. |
Bugware |
|
b. |
Abandonware |
|
c. |
Adware |
|
d. |
Spyware |
1 points
Question 94
____ is a general term for the process of verifying the identity of a person or a website.
a. |
Authentication |
|
b. |
Firewalling |
|
c. |
Inspection |
|
d. |
Spoofing |
1 points
Question 95
____ is a photo-sharing site.
a. |
Sight-Flight |
|
b. |
Flickr |
|
c. |
Pickr |
|
d. |
Pixar |
1 points
Question 96
____ is a process that hides encrypted messages within different types of files.
a. |
Stenagography |
|
b. |
Stenography |
|
c. |
Stegography |
|
d. |
Steganography |
1 points
Question 97
____ keys exist only during a single connection between a browser and a server.
a. |
Public |
|
b. |
Private |
|
c. |
Session |
|
d. |
none of the above |
1 points
Question 98
____ software manages the schedule for downloading podcast files to your device.
a. |
Webplanning |
|
b. |
Webcatcher |
|
c. |
Podcatcher |
|
d. |
Podplanning |
1 points
Question 99
____ was the first to make APIs available to other developers.
a. |
YouTube |
|
b. |
Craigslist.com |
|
c. |
Amazon.com |
|
d. |
eBay |
1 points
Question 100
_____ is a photo-sharing site and a social network.
a. |
|
|
b. |
Google+ |
|
c. |
Flickr |
|
d. |
Shutterfly |
`Hey,
Note: In case of any queries, just comment in box I would be very happy to assist all your queries
81) OPTION D IS CORRECT
82) OPTION D IS CORRECT
83) OPTION A IS CORRECT
84) OPTION B IS CORRECT
85) OPTION D IS CORRECT
Note: Brother According to HomeworkLib's policy we are only allowed to answer first 5 part if there are many. So, I request you to post other part as separate posts.
Kindly revert for any queries
Thanks.
Question 81 Web ____ caters to user-generated content. a. 1.5 b. 1.0 c. 4.0 d. 2.0...
QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a. Network b. Link c. Transport d. Application 2.5 points QUESTION 9 A relational database is a collection of one or more tables that are related by key values. True False 2.5 points QUESTION 10 Which standards organization produced the OSI reference model for internet communication? a. IEEE b. ISO c. ANSI 2.5 points QUESTION 11 Which of the following is used...
Question 1 A URL is a ____-part addressing scheme a. two b. four c. three d. one Question 2 A text file that contains HTML tags is called a(n) ____. a. server b. HTML document c. browser d. IP address Question 3 A(n) ____ comes into existence as soon as a work is placed into a tangible form. a. open-source project b. copyright c. reproduction notice d. lien Question 4 A(n) ____ is a small file...
IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...
What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...
Assignment Instructions You must choose one question from Topic 1 (A or B) and one question from Topic 2 (C or D). You will be answering a total of two questions for this assignment. Topic 1: Choose to answer either question 1 or 2 Topic 2: Choose to answer either question 3 or 4 TOPIC 1 Questions: 1. Assume that the chance of loss is 3 percent for two different fleets of trucks. Explain how it is possible that objective...
ppsMDb Youlube M Inbox- navee Question 1 6 marks he points A(a,b) and C(c,d) are the opposite vertices of square ABCD in the Cartesian plane What are the coordinates of the other two vertices? Be sure to cover all cases of where A and C could bel (a) 4 marks (b) What is the area of the square ABCD? 2 marks P A(ab) (Hint: you may find the following construction useful. Calculate both p+q and p-q) C(c,d) g Minh Pham...
Knowledge disclosure is a key way of identifying the organizational culture. Knowledge disclosure techniques such as storytelling allow us to uncover knowledge in the context of its use.IBM views stories as a powerful means of knowledge discovery and knowledge transfer. They are very good for conveying complex messages simply. Storytelling is a unifying and defining component of all organizations, managed and purposeful storytelling provides a powerful mechanism for the disclosure of intellectual or knowledge assets in companies. It can also...
Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...
The Test Weekl y QUESTION B Match the outpatient masons for growth with the example c new technology D. utilization controls B. A reductions in inpatient rates 8. preference for care at home Glaser surgery D. prior authorization social factors A changes in reimbursement QUESTIONS Outpatient care cannot be provided in hospital setting True False QUESTION 10 What is hospice care and what are does it focus on? For the toolbar, presa ALT-F10 (PC) or ALT-FN-F10 (Mac). TTT Arial (120...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...