Which term represents a count of the number of people who visit one site, click on an ad, and
are taken to the site of the advertiser?
a. Affiliate programs
b. Click‐through
c. Spam
d. All of the above

1 Answer

Answer :

b. Click‐through

Related questions

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a) Affiliate programs b) Click-through c) Spam d) All of the above

Last Answer : b) Click-through

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : The maximum cost-per-click (CPC) bid is the a. Most an advertiser is wiling to pay for each click on an ad. b. Amount an advertiser must pay to outbid competitors. c. Amount an advertiser is required to pay to achieve top ad position. d. Actual amount an advertiser pays for each click on an ad.

Last Answer : a. Most an advertiser is wiling to pay for each click on an ad.

Description : What is an arrangement made between marketing site that direct users from one site to the other? a) Spam b) Viral marketing c) Affiliate programs d) None of the above

Last Answer : c) Affiliate programs

Description : What is the name of the new anti‐Spam bill? a. No‐Spam b. CAN‐Spam c. Spam‐Away d. Stop Spam

Last Answer : b. CAN‐Spam

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware

Last Answer : a. Key logger software

Description : Spam B. Viral marketing C. Affiliate programs D. None of the above

Last Answer : B. Viral marketing

Description : Which, if any, of the following types of ads are people most willing to tolerate? a. pop‐under ad b. pop‐up ad c. banner ad d. none of the above

Last Answer : d. none of the above

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : What type of ad appears under a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad

Last Answer : a. pop‐under ad

Description : What type of ad appears on top of a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad

Last Answer : b. pop‐up ad

Description : Which type of add appears on a web page? a. pop‐under ad b. Pop‐up ad c. Banner ad d. Discount ad

Last Answer : c. Banner ad

Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : a. Flexibility

Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : d. Scalability

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : Google determines an ad`s rank based on: A. your website`s performance in Google`s natural search results. B. your CPC bid C. your keyword`s quality score on Google and its CPC. D. the length of time you have been an AdWords advertiser.

Last Answer : C. your keyword`s quality score on Google and its CPC

Description : This is a term for the number of times that user click on links in a message or on a website : it is much higher for legitimate marketing emails that for spam. A. personalization B. spamming C. CTR D. spoofing

Last Answer : C. CTR

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : b. Hot site

Description : What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : c. Cold site

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : How To Attract People To Purchase Products When They Click On Your Link As An Affiliate Marketer?

Last Answer : Always ensure you have a good call to answer and also you can add some incentive to your content such as the reduction in price which you have calculated to the taste of your client.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : What is going on??? When I click on a google link, it takes me to a shopping or ad site?

Last Answer : Sounds like your DNS cache has been hijacked by malware. Try using anti-virus software.

Description : Does this site really pay within 24 hours ? Click here to visit.

Last Answer : This site pays 100% and I received payment today.

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : What are the goals that marketers should strive for in email marketing? A. Spend less time on email marketing. B. Increase spam rates. C. Decrease deliverability rates D. Increase open rates and click rates

Last Answer : D. Increase open rates and click rates

Description : What are the goals that marketers should strive for in email marketing? A. Spend less time on email marketing. B. Increase open rates and click rates. C. Increase spam rates. D. Decrease deliverability rates

Last Answer : B. Increase open rates and click rates

Description : Which of the following factors is not considered when determining your quality score? a. Cost-Per-Click (CPC) Bid b. Click through Rate (CTR) c. Ad Text and Keywords d. Landing Page Relevance

Last Answer : d. Landing Page Relevance

Description : Which of the following can be used to help identify people in a crowd? a. Biochip b. Implant chip c. Facial recognition software d. Vision chip

Last Answer : c. Facial recognition software

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above

Last Answer : c. all of the above

Description : Which products are people most likely to be comfortable buying on the Internet? a. Books b. PCs c. CDs d. All of the above

Last Answer : d. All of the above

Description : Which products are people most likely to be more uncomfortable buying on the Internet? a. Books b. Furniture c. Movies d. All of the above

Last Answer : b. Furniture

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro