Description : Which of the following method used to identify user sessions? A. IP address B. authenticated user C. user agent D. All of the above
Last Answer : D. All of the above
Description : Identify the factor that enables tracking of good and bad reputation? A. IP address B. User engagement C. Fequency D. All of the above
Last Answer : A. IP address
Description : Which mobile metrics are used to evaluate app engagement page views revenue and sales downloads and users monthly active users, session length and events
Last Answer : monthly active users, session length and events
Description : Each web site is identified by a unique address called a 1. WWW 2. URL 3. URW 4. ULR
Last Answer : URL
Description : In a LAN network every system is identified by (A) Name (B) MAC address (C) IP Address (D) Serial number given by manufacturer
Last Answer : (C) IP Address
Description : Computers on an internet are identified by (A) e-mail address (B) street address (C) IP address (D) None of the above
Last Answer : (C) IP address
Description : Which among the following is / are user / users of the outcome of the Marketing Research ? A.Consumers B.BusinessFirms C. Government D. Producers 1. Only A 2. Only A & B 3. A, B & D 4. All the above 5. None of these
Last Answer : All the above
Description : Which among the following is/are user/users of the outcome of the Marketign Reserach ? A) Consumers B) Business Firms C) Government D) Producers 1. Only A 2. Only A & B 3. A, B & D 4. All the above 5. none of these
Description : The focus of web analytics is to understand the? A. users of a site B. User behavior C. User activities D. All of the above
Description : In order to identify the users, web analytics tools need to report on? A. user sessions B. Unique users C. Page Views D. All of the above
Last Answer : A. user sessions
Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... particular location. D. You can run different campaigns based on the location of the mobile use
Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location
Description : Accessibility w.r.t understanding site user requirement should include Number of visually impaired People Number of users of less Popular Browsers Both A & B None of the Above
Last Answer : Both A & B
Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... location. D. You can run different campaigns based on the location of the mobile user.
Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location.
Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above
Last Answer : D) All of the above
Description : Is there a way for a site to recognize an IP address to prevent trolls from maintaining multiple user accounts?
Last Answer : answer:It is tough if they use dial-up since they get a new IP each time they connect. But Zack is using SpeakEasy broadband (as far as I know) and probably has a static IP. Unless he is unplugging his modem every few minutes to get a new one. .htaccess guys. Learn to use it.
Description : One *** comes to my website and keeps spamming. I wonder if I can somehow find out where it comes from by its IP address. Unless it's someone from our city. Is it possible to find out? Of course I have his IP address.
Last Answer : Try this: http://whatismyipaddress.com/ip-lookup
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : The court shall presume that every document purporting to be a power of attorney and to have been executed before, and authenticate by a) A Notary public b) Any court, Judge or Magistrate c) Consul or Vice consul, or representative of the Central Government d) All the above
Last Answer : d) All the above
Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES
Last Answer : c. public keys of subscribers
Description : The affinity audience can be defined as __________. a. A user similar to that of your remarketing list b. A marketing user who is willing to make a purchase c. A user showing a continuous interest in the matter d. A user similar to that of your customer list
Last Answer : c. A user showing a continuous interest in the matter
Description : A Target market is 1. entire country 2. entire city 3. entire globe 4. that which consists of customers who need the identified product 5. all of these
Last Answer : that which consists of customers who need the identified product
Description : A Target Market is 1. entire country 2. entire city 3. entire globe 4. that which consists of customers who need the identified product 5. all of these
Description : Keyword scope" is associate with which type of scope in Web analytics? Session scope Visitor scope Page Scope None of the above
Last Answer : Page Scope
Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer
Last Answer : b. Session Layer
Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) Application
Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer
Last Answer : a.Application layer
Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application
Last Answer : d.application
Description : The TCP/IP …………corresponds to the combined session, presentation, and application layers of the OSI model. a.session layer b.presentation layer c.application layer d.None of the above
Last Answer : c.application layer
Description : Which of the following layers is an addition to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer
Last Answer : d. Session and Presentation layer
Description : .In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a. Application layer b. Transport layer c. Link layer d. Session layer
Last Answer : a. Application layer
Description : Which is the additional layer to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer
Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link
Last Answer : B. physical, data link, network
Description : TCP/IP layer is equivalent to combined Session, Presentation and a. Transport layer b. Network layer c. Application layer d. Physical layer
Last Answer : c. Application layer
Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer
Last Answer : B) Session Layer
Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Description : TCP/IP ..................layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport
Last Answer : A) UDP
Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address
Last Answer : c. network address & host address
Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address
Last Answer : C. network address & host address
Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above
Last Answer : For assurance engagements provided to an audit client
Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... whenthe assurance report is expressly restricted for use by identified users. d. All of the above
Last Answer : For assurance engagements provided to an audit client.
Description : Users who use media for their own ends are identified as (A) Passive audience (B) Active audience (C) Positive audience (D) Negative audience
Last Answer : (B) Active audience
Description : The use of antibiotics can be based on either the clinical course of a patient without the benefit of well-defined microbiologic data (empiric therapy), or targeted at ... which polymicrobial infection is identified, specifically-directed treatment for the predominant organism is satisfactory
Last Answer : Answer: c The use of empiric therapy without the benefit of well-defined microbiologic data is appropriate when there is sufficient clinical evidence to support the diagnosis such that it would ... components of the infection if the body site is such that these microorganisms may be present
Description : What group of microbial agent was identified from the work of Ivanowsky a Beijerinck? a. Viruses b. Fungi c. Protozoa d. Bacteria
Last Answer : a. Viruses
Description : Most, but not all, marketing channels have marketing intermediaries. A marketing intermediary, sometimes called a middleman 1. is always a wholesaler 2. links producers to other middlemen or the ultimate ... always sells products to retailers 4. does not take title to products 5. none of these
Last Answer : links producers to other middlemen or the ultimate users of the products
Description : For routinely purchased items, buyers are frequently the : 1. Users 2. Influencers 3. Deciders 4. Gatekeepers 5. None of these
Last Answer : Deciders