Question

Question 81 Web ____ caters to user-generated content. a. ​1.5 b. ​1.0 c. ​4.0 d. ​2.0...

Question 81

  1. Web ____ caters to user-generated content.

    a.

    ​1.5

    b.

    ​1.0

    c.

    ​4.0

    d.

    ​2.0

1 points

Question 82

  1. Webpages secured by SSL have URLs that begin with ____.

    a.

    ​SSL://

    b.

    ​IETF://

    c.

    ​S-http://

    d.

    ​https://

1 points

Question 83

  1. When the Usenet News Service began operating, the only way to read or post articles to newsgroups was to install and run a software program called a ____.

    a.

    ​newsreader

    b.

    ​news widget

    c.

    ​news catcher

    d.

    ​news group

1 points

Question 84

  1. Which of the following is NOT an example of pull technology?

    a.

    ​newsgroups

    b.

    ​online social networks

    c.

    ​podcasts

    d.

    ​mailing lists

1 points

Question 85

  1. Which of the following is NOT an example of push technology?

    a.

    ​online social networks

    b.

    ​video-sharing sites

    c.

    ​instant messaging

    d.

    ​mashups

1 points

Question 86

  1. Which of the following is an example of a newsfeed using pull technology?

    a.

    ​Facebook

    b.

    ​Twitter

    c.

    ​Usenet

    d.

    ​Google Chat

1 points

Question 87

  1. Windows Live Messenger has been replaced with _____.

    a.

    ​AIM

    b.

    ​Skype

    c.

    ​Yahoo! Messenger

    d.

    ​ICQ

1 points

Question 88

  1. You can listen to or watch a podcast on a _____.

    a.

    ​computer

    b.

    ​smartphone

    c.

    ​tablet

    d.

    ​all of the above

1 points

Question 89

  1. YouTube was started in ____ as a private venture.

    a.

    ​2003

    b.

    ​2005

    c.

    ​2001

    d.

    ​2007

1 points

Question 90

  1. ____ allows users to send very short messages to others who are connected to the network using smartphones or other Internet devices.

    a.

    ​Text messaging

    b.

    ​Podcasting

    c.

    ​Posting

    d.

    ​Email messaging

1 points

Question 91

  1. ____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables.

    a.

    ​Clickstream

    b.

    ​Static

    c.

    ​Graphic

    d.

    ​Active content

1 points

Question 92

  1. ____ encryption uses a single key that both the sender and receiver know.

    a.

    ​Private-key

    b.

    ​Asymmetric

    c.

    ​Man-in-the-Middle

    d.

    ​Public-key

1 points

Question 93

  1. ____ is a general category of software that includes advertisements to pay for the product for which it appears.

    a.

    ​Bugware

    b.

    ​Abandonware

    c.

    ​Adware

    d.

    ​Spyware

1 points

Question 94

  1. ____ is a general term for the process of verifying the identity of a person or a website.

    a.

    ​Authentication

    b.

    ​Firewalling

    c.

    ​Inspection

    d.

    ​Spoofing

1 points

Question 95

  1. ____ is a photo-sharing site.

    a.

    ​Sight-Flight

    b.

    ​Flickr

    c.

    ​Pickr

    d.

    ​Pixar

1 points

Question 96

  1. ____ is a process that hides encrypted messages within different types of files.

    a.

    ​Stenagography

    b.

    ​Stenography

    c.

    ​Stegography

    d.

    ​Steganography

1 points

Question 97

  1. ____ keys exist only during a single connection between a browser and a server.

    a.

    ​Public

    b.

    ​Private

    c.

    ​Session

    d.

    ​none of the above

1 points

Question 98

  1. ____ software manages the schedule for downloading podcast files to your device.

    a.

    ​Webplanning

    b.

    ​Webcatcher

    c.

    ​Podcatcher

    d.

    ​Podplanning

1 points

Question 99

  1. ____ was the first to make APIs available to other developers.

    a.

    ​YouTube

    b.

    ​Craigslist.com

    c.

    ​Amazon.com

    d.

    ​eBay

1 points

Question 100

  1. _____ is a photo-sharing site and a social network.

    a.

    ​Instagram

    b.

    ​Google+

    c.

    ​Flickr

    d.

    ​Shutterfly

0 0
Add a comment Improve this question Transcribed image text
Answer #1

`Hey,

Note: In case of any queries, just comment in box I would be very happy to assist all your queries

81) OPTION D IS CORRECT

82) OPTION D IS CORRECT

83) OPTION A IS CORRECT

84) OPTION B IS CORRECT

85) OPTION D IS CORRECT

Note: Brother According to HomeworkLib's policy we are only allowed to answer first 5 part if there are many. So, I request you to post other part as separate posts.

Kindly revert for any queries

Thanks.

Add a comment
Know the answer?
Add Answer to:
Question 81 Web ____ caters to user-generated content. a. ​1.5 b. ​1.0 c. ​4.0 d. ​2.0...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a....

    QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a. Network b. Link c. Transport d. Application 2.5 points    QUESTION 9 A relational database is a collection of one or more tables that are related by key values. True False 2.5 points    QUESTION 10 Which standards organization produced the OSI reference model for internet communication? a. IEEE b. ISO c. ANSI 2.5 points    QUESTION 11 Which of the following is used...

  • Question 1 ​ A URL is a ____-part addressing scheme a. ​two b. ​four c. ​three...

    Question 1 ​ A URL is a ____-part addressing scheme a. ​two b. ​four c. ​three d. ​one Question 2 ​ A text file that contains HTML tags is called a(n) ____. a. ​server b. ​HTML document c. ​browser d. ​IP address Question 3 ​ A(n) ____ comes into existence as soon as a work is placed into a tangible form. a. ​open-source project b. ​copyright c. ​reproduction notice d. ​lien Question 4 ​ A(n) ____ is a small file...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • What are your top 3 takaways from this article? It’s always tempting to see the present...

    What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...

  • Assignment Instructions You must choose one question from Topic 1 (A or B) and one question from Topic 2 (C or D)....

    Assignment Instructions You must choose one question from Topic 1 (A or B) and one question from Topic 2 (C or D). You will be answering a total of two questions for this assignment. Topic 1: Choose to answer either question 1 or 2 Topic 2: Choose to answer either question 3 or 4 TOPIC 1 Questions: 1. Assume that the chance of loss is 3 percent for two different fleets of trucks. Explain how it is possible that objective...

  • PpsMDb Youlube M Inbox- navee Question 1 6 marks he points A(a,b) and C(c,d) are the opposite ver...

    ppsMDb Youlube M Inbox- navee Question 1 6 marks he points A(a,b) and C(c,d) are the opposite vertices of square ABCD in the Cartesian plane What are the coordinates of the other two vertices? Be sure to cover all cases of where A and C could bel (a) 4 marks (b) What is the area of the square ABCD? 2 marks P A(ab) (Hint: you may find the following construction useful. Calculate both p+q and p-q) C(c,d) g Minh Pham...

  • Knowledge disclosure is a key way of identifying the organizational culture. Knowledge disclosure techniques such as...

    Knowledge disclosure is a key way of identifying the organizational culture. Knowledge disclosure techniques such as storytelling allow us to uncover knowledge in the context of its use.IBM views stories as a powerful means of knowledge discovery and knowledge transfer. They are very good for conveying complex messages simply. Storytelling is a unifying and defining component of all organizations, managed and purposeful storytelling provides a powerful mechanism for the disclosure of intellectual or knowledge assets in companies. It can also...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • The Test Weekl y QUESTION B Match the outpatient masons for growth with the example c...

    The Test Weekl y QUESTION B Match the outpatient masons for growth with the example c new technology D. utilization controls B. A reductions in inpatient rates 8. preference for care at home Glaser surgery D. prior authorization social factors A changes in reimbursement QUESTIONS Outpatient care cannot be provided in hospital setting True False QUESTION 10 What is hospice care and what are does it focus on? For the toolbar, presa ALT-F10 (PC) or ALT-FN-F10 (Mac). TTT Arial (120...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT