Question

Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people...

Question 61

  1. ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people were using the Internet, does not include rules specifically designed to protect the privacy of persons using websites to conduct transactions.

    a.

    ​1996

    b.

    ​1981

    c.

    ​1986

    d.

    ​1991

1 points

Question 62

  1. ​The ____ model is the process or processes that a company uses to find new customers, make sales, and deliver the goods or services it sells.

    a.

    ​subscription

    b.

    ​revenue

    c.

    ​mixed advertising-subscription

    d.

    ​advertising

1 points

Question 63

  1. ​The _____ details among browsers, which differ from browser to browser, will probably play into your decision regarding which browser becomes your preferred choice.

    a.

    ​root programming

    b.

    ​implementation

    c.

    ​API protocols

    d.

    ​user interface

1 points

Question 64

  1. ​The _____ states that the number of ways that a complex event can occur is found by multiplying together the number of ways that each of its component events can happen.

    a.

    ​decomposition process

    b.

    ​fundament counting theorem

    c.

    ​multiplication algorithm

    d.

    ​computational thinking

1 points

Question 65

  1. ​The computational thinking tool of pattern recognition examines data by a computer using machine learning _____.

    a.

    ​predictions

    b.

    ​identification systems

    c.

    ​datasets

    d.

    ​algorithms

1 points

Question 66

  1. ​The computational thinking tool of pattern recognition has been successfully used for _____.

    a.

    ​automated speech and facial recognition

    b.

    ​fingerprint analysis

    c.

    ​all of the above

    d.

    ​military applications

1 points

Question 67

  1. ​The digital wallet stores a user’s payment information such as bank account and credit card numbers, a ____ to identify the user, and information that the user provides such as shipping information to speed up Internet transactions.

    a.

    ​watermark

    b.

    ​digital fingerprint

    c.

    ​photo ID

    d.

    ​digital certificate

1 points

Question 68

  1. ​The introduction of a new web-based travel agency into the travel industry is an example of ____.

    a.

    ​disintermediation

    b.

    ​monopolization

    c.

    ​corporate consolidation

    d.

    ​reintermediation

1 points

Question 69

  1. ​The most common form of e-commerce is ____, which refers to selling physical products on the web.

    a.

    ​offline retail

    b.

    ​mixed retail

    c.

    ​3G retail

    d.

    ​online retail

1 points

Question 70

  1. ​The name of a simple data structure that facilitates the first in, first out storage model is _____.

    a.

    ​queue

    b.

    ​stack

    c.

    ​tree

    d.

    ​selection

1 points

Question 71

  1. ​The of principle of separation of interface from implementation can be found when using _____.

    a.

    ​automobiles

    b.

    ​computers

    c.

    ​smartphones

    d.

    ​all of the above

1 points

Question 72

  1. ​The process of compiling data from a variety of sources to form a composite dataset for data processing purposes is called _____.

    a.

    ​data visualization

    b.

    ​data cleansing

    c.

    ​data aggregation

    d.

    ​data acquisition

1 points

Question 73

  1. ​The removal of an intermediary from an industry is known as ____.

    a.

    ​reintermediation

    b.

    ​monopolization

    c.

    ​corporate consolidation

    d.

    ​disintermediation

1 points

Question 74

  1. ​The text listed ____ as one of the greatest expenses for liquidation brokers when sales took place in a physical location.

    a.

    ​finding experienced employees

    b.

    ​shipping the items to the purchasers

    c.

    ​sourcing items to sell

    d.

    ​leasing a place to hold the auction

1 points

Question 75

  1. ​The text listed all of the following as benefits of online retail shopping EXCEPT: ____.

    a.

    ​shipping can add to the cost

    b.

    ​a video demonstrating the product is often available

    c.

    ​it is simple to compare prices

    d.

    ​you can shop any time of the day or night

1 points

Question 76

  1. ​The text listed all of the following as drawbacks to online retail shopping EXCEPT: ____.

    a.

    ​it can take up to a week to receive the item

    b.

    ​you cannot see or hold the item

    c.

    ​shipping adds cost to the price

    d.

    ​shopping online takes more time than going to a store

1 points

Question 77

  1. ​The top node in a binary tree data structure is the _____.

    a.

    ​root node

    b.

    ​first node

    c.

    ​primary

    d.

    ​node

1 points

Question 78

  1. ​The way an ATM works behind the scenes is considered an example of _____.

    a.

    ​API protocols

    b.

    ​user interface

    c.

    ​implementation

    d.

    ​root programming

1 points

Question 79

  1. ​To check how data is collected and used when you are on their sites, you can check the Facebook Data Policy page or the Google _____ page.

    a.

    ​My Account

    b.

    ​Privacy Basics

    c.

    ​Privacy Policy

    d.

    ​LinkedIn

1 points

Question 80

  1. ​Twitter uses _____ and similar technologies for authentication and security, preferences, analytics and research, personalized content, and advertising.

    a.

    ​cookies

    b.

    ​location information

    c.

    ​APIs

    d.

    ​queues

Homework Answers

Answer #1

61) 1986
62) revenue
63) implementation
64) fundament counting theorem
65) algorithms
66) military applications
67) digital certificate
68) reintermediation
69) online retail
70) queue
71) all of the above
72) data aggregation
73) disintermediation
74) leasing a place to hold the auction
75) shipping can add to the cost
76) shopping online takes more time than going to a store
77) root node
78) implementation
79) Privacy Policy
80) cookies

It's taking forever to answer 20. Please post a maximum of 10 MCQ's per post.


Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Question 21 ​Businesses take a variety of approaches to generating revenue on the web. These approaches...
Question 21 ​Businesses take a variety of approaches to generating revenue on the web. These approaches include the use of online sales of ____, subscriptions, and direct fees. a. ​goods b. ​services c. ​both a. and b. d. ​neither a. nor b. 1 points Question 22 ​Companies that sell only on the web are sometimes called ____ companies. a. ​dot-com b. ​meta c. ​dynamically arranged d. ​mortar 1 points Question 23 ​Computational tools are used by _____. a. ​computer scientists...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li />...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li /> c. ​<ul> d. ​<nl> 1 points Question 62 ​The term for a collection of website files stored on a web server is ____. a. ​active website b. ​local website c. ​remote website d. ​plug-in website 1 points Question 63 ​The text editor installed with Windows is called ____. a. ​web pad b. ​MS Sketch c. ​Notebook d. ​Notepad 1 points Question 64 ​The text...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
QUESTION 1 A signal containing information will be associated with an infinite bandwidth; however most of...
QUESTION 1 A signal containing information will be associated with an infinite bandwidth; however most of the signal’s energy is contained in the effective bandwidth which can be isolated using a passbandRF filter. This is why we call a modulated carrier wave a passband signal. True False 10 points    QUESTION 2 If we limit a signals frequency bandwidth too narrowly, we introduce signal distortion. True False 10 points    QUESTION 3 What is the difference between a signal amplifier...
Question 5 A ____ is a technologically skilled person who uses his or her skills to...
Question 5 A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers. a. ​cracker b. ​script kiddie c. ​whacker d. ​zombie 1 points Question 6 A ____ stores items on a server as articles or postings that are sorted by topic. a. ​newsgroup b. ​chat c. ​podcast d. ​mailing list 1 points Question 7 A ____-bit key is considered a(n) ____ key. a. ​64, strong b. ​128, strong c. ​128, weak...
QUESTION 44 The key phrase that describes the concept of quantum computing is A. Exponentially scalable...
QUESTION 44 The key phrase that describes the concept of quantum computing is A. Exponentially scalable and highly parallel computing B. Able to accommodate massive quantities of data C. Able to connect to an increased number of devices D. Accommodates a quantum leap in the number of memory cards in a device 2 points    QUESTION 45 Revenue models for most Social Media companies include the following, EXCEPT: A. Charging a fee for their basic service level B. Advertising revenues...
In-depth interviews of consumers are often useful in foreign markets: a. to get insights into attitudes...
In-depth interviews of consumers are often useful in foreign markets: a. to get insights into attitudes b. to capture nuances often lost in surveys c. when the government is hostile d. to avoid biases in research 1 points    QUESTION 53 Luxury brands can reach a stage of maturity that: a. heralds their eventual demise b. like mass, requires new strategies c. can lead to revitalizing/repositioning d. reach scale and better pricing 1 points    QUESTION 54 The concept of...
QUESTION 1 Which one of the following would NOT be necessary for an offer to have...
QUESTION 1 Which one of the following would NOT be necessary for an offer to have legal standing? A. The language must reflect the intent to become a party to a contract. B. All of the conditions under which the offer would be terminated must be identified. C. All the significant terms and/or conditions must be contained in the offer. D. The offer must be effectively communicated to the other party. 3 points    QUESTION 2 Which one of the...
This is in java and you are not allowed to use Java API classes for queues,...
This is in java and you are not allowed to use Java API classes for queues, stacks, arrays, arraylists and linkedlists. You have to write your own implementations for them. You should construct a BST by inserting node values starting with a null tree. You can re-use the code for the insert method given in the sample code from the textbook. -insert method is provided below Your code should have a menu driven user interface at the command line with...
Question 1 of 15 Which of the following is not a recommended starting point to enter...
Question 1 of 15 Which of the following is not a recommended starting point to enter sales of products/services? A. Quick Create > Invoice B. Register > New transaction C. Quick Create > Sales Receipt D. Customer detail page > New transaction E. Transactions > Sales > New transaction Question 2 of 15 Which of the following statements accurately describes bank rules? A. Bank rules are imported from the Bank's website into the For Review tab in the Banking Center...