Description : The user session can be identified by the __________. a. Authenticate users b. IP Address c. User Agent d. All of the above
Last Answer : d. All of the above
Description : Identify the factor that enables tracking of good and bad reputation? A. IP address B. User engagement C. Fequency D. All of the above
Last Answer : A. IP address
Description : In order to identify the users, web analytics tools need to report on? A. user sessions B. Unique users C. Page Views D. All of the above
Last Answer : A. user sessions
Description : The most common user identification technique is via? A. Sessions B. Cookies C. Segmentation D. page views
Last Answer : B. Cookies
Description : Which fact about push messaging is true? 1. Users with push enabled have 88% more app launches 2. Users with push enabled have 55% shorter intervals between app sessions 3. Users with push enabled have a 3X higher retention rate 4. All of these are true
Last Answer : All of these are true
Description : Which metrics would accurately indicate the success of the latest Facebook post? A. Likes and click-through B. Impressions and click-through C. Reach and engagement D. Sessions and pageview
Last Answer : C. Reach and engagement
Description : . If I want to have an estimate of the number of people who visited my website, which metric should I use? A. Sessions B. Unique visitors C. Users D. Hits
Last Answer : B. Unique visitors
Description : Which fact about push messaging is true? users with push enabled have 88% more app launches users with push enabled have 3x more retention rate users with push enabled have 55% shorter intervals between app sessions All of the above
Last Answer : All of the above
Description : What are "any request for a file from a Web server“ in web analytics? Hits Sessions Page views Visitor
Last Answer : Hits
Description : Is there a way for a site to recognize an IP address to prevent trolls from maintaining multiple user accounts?
Last Answer : answer:It is tough if they use dial-up since they get a new IP each time they connect. But Zack is using SpeakEasy broadband (as far as I know) and probably has a static IP. Unless he is unplugging his modem every few minutes to get a new one. .htaccess guys. Learn to use it.
Description : One *** comes to my website and keeps spamming. I wonder if I can somehow find out where it comes from by its IP address. Unless it's someone from our city. Is it possible to find out? Of course I have his IP address.
Last Answer : Try this: http://whatismyipaddress.com/ip-lookup
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination
Last Answer : A. source, destination
Description : Identify the IP address from the following: (A) 300 .215.317 3 (B) [email protected] (C) 202.50.20.148 (D) 202-50-20-148
Last Answer : (C) 202.50.20.148
Description : What is the price of a 1911 Colt 45 Military issued and never fired mint condition. It has been Authenticated?
Last Answer : Impossible to answer. If you are referring to a military issue1911 pistol that is in new, unused condition, that is so rare thatthere are no comparable sales to use to judge value- it is ... would be tosell it. For insurance purposes, you would need an appraisal from alicensed firearms appraiser.
Description : Alterations, if any, on cheques are required to be authenticated by the signature of _______ A. Payee B. Depositor C. Drawer D. Endorse E. All of the above
Last Answer : C. Drawer Explanation: Alterations, if any, on cheques are required to be authenticated by the drawer‘s signature against each such alteration.
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned
Last Answer : OpenID
Last Answer : Bangabandhu Sheikh Mujibur Rahman addressed the 21st session in Bengali.
Description : What occurs in the session layer? a.Data compression and encryption b.MAC address are handled c.binary to decimal conversion d.sessions are created
Last Answer : d.sessions are created
Description : LIC agent is an example of 1. Two level marketing 2. Three level marketing 3. Direct marketing 4. Indirect marketing 5. None of these
Last Answer : Direct marketing
Description : The person or firm that buys large quantity of goods from various producers or vendors, warehouses them, and resells to retailers is called 1. Industrial distributor 2. Production agent 3. Wholesaler 4. Manufacturer's agent 5. Producer
Last Answer : Wholesaler
Description : A manufacturer owned middleman that sells products and provides support services for the manufacturer's sales force is called a sales ___________ 1. branch 2. office 3. manager 4. broker 5. agent
Last Answer : branch
Description : An intermediary between the producer and consumer is called 1. Middlemen 2. Agent 3. Broker 4. All of the above 5. None of these
Last Answer : Middlemen
Description : A DSA means ? 1. Directly Selling Authority 2. Direct Selling Agent 3. Direct Shifting Authority 4. Domestic Seller Agent 5. Distributors and Selling Agencies
Last Answer : Direct Selling Agen
Description : Which among the following is / are user / users of the outcome of the Marketing Research ? A.Consumers B.BusinessFirms C. Government D. Producers 1. Only A 2. Only A & B 3. A, B & D 4. All the above 5. None of these
Last Answer : All the above
Description : Which of the following labels is not associated with a role of buying Decision Making Unit ? 1. Supplier 2. Gatekeeper 3. Decision Maker 4. User 5. None of these
Last Answer : Gatekeeper
Description : Which of the following is most likely to stimulate customer loyalty ? 1. corruption 2. sweepstakes 3. frequent-user incentives 4. samples 5. premiums
Last Answer : frequent-user incentives
Description : The package design of a bag of flour would most likely be criticized for being 1. unsafe to the environment 2. unsafe to the user 3. deceptive 4. functionality deficient 5. well suited for multiple-unit packaging
Last Answer : functionality deficient
Description : Which among the following is/are user/users of the outcome of the Marketign Reserach ? A) Consumers B) Business Firms C) Government D) Producers 1. Only A 2. Only A & B 3. A, B & D 4. All the above 5. none of these
Description : Which of these statements about In-app messaging is false? 1. In-app messages should not look an ad 2. In-app messages can be both promotional and functional 3. In-app creative should be personalized for different user segments 4. In-app messages can only contain one call-toaction
Last Answer : In-app messages can only contain one call-toaction
Description : ……….. is the measurement and analysis of data to inform an understanding of user behavior across web pages. 1. Web analytics 2. Data analytics 3. Marketing Analytics 4. Media analytics
Last Answer : Web analytics
Description : The affinity audience can be defined as __________. a. A user similar to that of your remarketing list b. A marketing user who is willing to make a purchase c. A user showing a continuous interest in the matter d. A user similar to that of your customer list
Last Answer : c. A user showing a continuous interest in the matter
Description : Which of the following is not specifically required by the search engines? a. Poor user experience b. Keyword stuffing c. Buying links d. All of the above
Description : Last-click attribution is defined as: A. The last date on which a new customer clicked to your website B. The channel that received the most amount of clicks in the sales cycle C. The ... before the customer purchase D. The channel that sent the user to your website immediately before the sale
Last Answer : C. The last point in the sales cycle before the customer purchase
Description : The focus of web analytics is to understand the? A. users of a site B. User behavior C. User activities D. All of the above
Last Answer : D. All of the above
Description : Which are the two central pillars of business success for Conversion Optimization to succeed? A. Customer Focus and Continuous Improvement B. Continuous Improvement and Marketing C. Marketing and Customer Focus D. User Experience and Sales
Last Answer : A. Customer Focus and Continuous Improvement
Description : Which of the following true statement about CRO? A. Decreased ROI B. Improve user base C. Increased acquisition cost D. All of the above
Last Answer : B. Improve user base
Description : Which of the following is an important aspect of creating blogs and posting content? A. Using a witty user name B. Posting at least once a month to the blog C. Social Media Optimization D. All of the above
Description : This is a term for the number of times that user click on links in a message or on a website : it is much higher for legitimate marketing emails that for spam. A. personalization B. spamming C. CTR D. spoofing
Last Answer : C. CTR
Description : Which of the following items search engines don't want? A. keyword stuffing B. buying links C. poor user experience D. All of the above
Description : At stage of user browsing app store page of your app what is the objective? A. Maximize usage B. Maximize conversion C. Maximize interest D. All of the above
Last Answer : B. Maximize conversion
Description : What is true about 2D barcodes? A. barcodes cannot scan vertically B. barcodes cannot scan horizontally C. A mobile user can scan barcodes in the environment to access associated information. D. Both B and C
Last Answer : C. A mobile user can scan barcodes in the environment to access associated information
Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... particular location. D. You can run different campaigns based on the location of the mobile use
Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location
Description : Why did Internet Service providers clamp down on personal emails being used for mailing purposes? A. Because it would use excessive server resources B. Because they couldn't check who was opening the ... . Because it would slow down the network D. Because it was against the email user guidelines
Last Answer : A. Because it would use excessive server resources
Description : Why to opt for a hybrid mobile app? rich user experience, program specific and proven for mobile apps fast development cycle, cross platform and updates app like experience None of the above
Last Answer : fast development cycle, cross platform and updates
Description : Accessibility w.r.t understanding site user requirement should include Number of visually impaired People Number of users of less Popular Browsers Both A & B None of the Above
Last Answer : Both A & B
Description : Which of the following statements is true The web designer shouldn’t just be concerned about the looks but also about user interface Usability is very important in web design Both A & B None of the above
Last Answer : Both A & B
Description : Which of the following is an important aspect of creating blogs and posting content? * Using a witty user name Posting at least once a month to the blog Social Media Optimization All of the above