The user session can be identified by the __________.
a.
Authenticate users
b. IP Address
c. User Agent
d. All of the above

1 Answer

Answer :

d. All of the above

Related questions

Description : Which of the following method used to identify user sessions? A. IP address B. authenticated user C. user agent D. All of the above

Last Answer : D. All of the above

Description : Identify the factor that enables tracking of good and bad reputation? A. IP address B. User engagement C. Fequency D. All of the above

Last Answer : A. IP address

Description : Which mobile metrics are used to evaluate app engagement  page views  revenue and sales  downloads and users  monthly active users, session length and events

Last Answer :  monthly active users, session length and events

Description : Each web site is identified by a unique address called a 1. WWW 2. URL 3. URW 4. ULR

Last Answer : URL

Description : In a LAN network every system is identified by (A) Name (B) MAC address (C) IP Address (D) Serial number given by manufacturer

Last Answer : (C) IP Address

Description : Computers on an internet are identified by (A) e-mail address (B) street address (C) IP address (D) None of the above

Last Answer : (C) IP address

Description : Which among the following is / are user / users of the outcome of the Marketing Research ? A.Consumers B.BusinessFirms C. Government D. Producers 1. Only A 2. Only A & B 3. A, B & D 4. All the above 5. None of these

Last Answer : All the above

Description : Which among the following is/are user/users of the outcome of the Marketign Reserach ? A) Consumers B) Business Firms C) Government D) Producers 1. Only A 2. Only A & B 3. A, B & D 4. All the above 5. none of these

Last Answer : All the above

Description : The focus of web analytics is to understand the? A. users of a site B. User behavior C. User activities D. All of the above

Last Answer : D. All of the above

Description : In order to identify the users, web analytics tools need to report on? A. user sessions B. Unique users C. Page Views D. All of the above

Last Answer : A. user sessions

Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... particular location. D. You can run different campaigns based on the location of the mobile use

Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location

Description : Accessibility w.r.t understanding site user requirement should include  Number of visually impaired People  Number of users of less Popular Browsers  Both A & B  None of the Above

Last Answer : Both A & B

Description : Location is a unique feature of Mobile Marketing because ____________. A. It enables brands to hyper-target their customers. B. It allows you to customize the marketing messages to suit the needs ... location. D. You can run different campaigns based on the location of the mobile user.

Last Answer : B. It allows you to customize the marketing messages to suit the needs of users of a particular location.

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : Is there a way for a site to recognize an IP address to prevent trolls from maintaining multiple user accounts?

Last Answer : answer:It is tough if they use dial-up since they get a new IP each time they connect. But Zack is using SpeakEasy broadband (as far as I know) and probably has a static IP. Unless he is unplugging his modem every few minutes to get a new one. .htaccess guys. Learn to use it.

Description : One *** comes to my website and keeps spamming. I wonder if I can somehow find out where it comes from by its IP address. Unless it's someone from our city. Is it possible to find out? Of course I have his IP address.

Last Answer : Try this: http://whatismyipaddress.com/ip-lookup

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : The court shall presume that every document purporting to be a power of attorney  and to have been executed before, and authenticate by a) A Notary public b) Any court, Judge or Magistrate c) Consul or Vice consul, or representative of the Central Government d) All the above

Last Answer : d) All the above

Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES 

Last Answer : c. public keys of subscribers  

Description : The affinity audience can be defined as __________. a. A user similar to that of your remarketing list b. A marketing user who is willing to make a purchase c. A user showing a continuous interest in the matter d. A user similar to that of your customer list

Last Answer : c. A user showing a continuous interest in the matter

Description : A Target market is 1. entire country 2. entire city 3. entire globe 4. that which consists of customers who need the identified product 5. all of these

Last Answer : that which consists of customers who need the identified product

Description : A Target Market is 1. entire country 2. entire city 3. entire globe 4. that which consists of customers who need the identified product 5. all of these

Last Answer : that which consists of customers who need the identified product

Description : Keyword scope" is associate with which type of scope in Web analytics?  Session scope  Visitor scope  Page Scope  None of the above

Last Answer :  Page Scope

Description : Which of the following is not the layer of TCP/IP protocol? a. Application Layer b. Session Layer c. Transport Layer d. Internetwork layer

Last Answer : b. Session Layer

Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer

Last Answer : a.Application layer

Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application

Last Answer : d.application

Description : The TCP/IP …………corresponds to the combined session, presentation, and application layers of the OSI model. a.session layer b.presentation layer c.application layer d.None of the above

Last Answer : c.application layer

Description : Which of the following layers is an addition to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer

Last Answer : d. Session and Presentation layer

Description : .In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a. Application layer b. Transport layer c. Link layer d. Session layer

Last Answer : a. Application layer

Description : Which of the following layers is an addition to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer

Last Answer : d. Session and Presentation layer

Description : Which is the additional layer to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer

Last Answer : d. Session and Presentation layer

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : TCP/IP layer is equivalent to combined Session, Presentation and a. Transport layer b. Network layer c. Application layer d. Physical layer

Last Answer : c. Application layer

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : TCP/IP ..................layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) UDP

Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address

Last Answer : c. network address & host address

Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address

Last Answer : C. network address & host address

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... whenthe assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client.

Description : Users who use media for their own ends are identified as (A) Passive audience (B) Active audience (C) Positive audience (D) Negative audience

Last Answer : (B) Active audience

Description : The use of antibiotics can be based on either the clinical course of a patient without the benefit of well-defined microbiologic data (empiric therapy), or targeted at ... which polymicrobial infection is identified, specifically-directed treatment for the predominant organism is satisfactory

Last Answer : Answer: c The use of empiric therapy without the benefit of well-defined microbiologic data is appropriate when there is sufficient clinical evidence to support the diagnosis such that it would ... components of the infection if the body site is such that these microorganisms may be present

Description : What group of microbial agent was identified from the work of Ivanowsky a Beijerinck? a. Viruses b. Fungi c. Protozoa d. Bacteria

Last Answer : a. Viruses

Description : Most, but not all, marketing channels have marketing intermediaries. A marketing intermediary, sometimes called a middleman 1. is always a wholesaler 2. links producers to other middlemen or the ultimate ... always sells products to retailers 4. does not take title to products 5. none of these

Last Answer : links producers to other middlemen or the ultimate users of the products

Description : For routinely purchased items, buyers are frequently the : 1. Users 2. Influencers 3. Deciders 4. Gatekeepers 5. None of these

Last Answer : Deciders