What type of ad appears under a web page?
a. pop‐under ad
b. pop‐up ad
c. banner ad
d. discount ad

1 Answer

Answer :

a. pop‐under ad

Related questions

Description : What type of ad appears on top of a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad

Last Answer : b. pop‐up ad

Description : Which type of add appears on a web page? a. pop‐under ad b. Pop‐up ad c. Banner ad d. Discount ad

Last Answer : c. Banner ad

Description : Which type of ad appears on a top of a web page? a. pop-under ad b. pop-up ad c. banner ad d. discount ad

Last Answer : b. pop-up ad

Description : Which type of ad appears on a top of a web page? a. pop-under ad b. pop-up ad c. banner ad d. discount ad

Last Answer : b. pop-up ad

Description : Which type of ad appears on a top of a web page? a. pop-under ad b. pop-up ad c. banner ad d. discount ad

Last Answer : b. pop-up ad

Description : Which types of ad appears on a web page? a) Pop-under ad b) Pop-up ad c) Banner ad d) Discount ad

Last Answer : c) Banner ad

Description : Which, if any, of the following types of ads are people most willing to tolerate? a. pop‐under ad b. pop‐up ad c. banner ad d. none of the above

Last Answer : d. none of the above

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above

Last Answer : d. All the above

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above

Last Answer : b. Click‐through

Description : This operates algorithmically or using a mixture of algorithmic and human input to collect, index, store and retrieve information on the web (e.g. web pages, images, information and other types of files). It makes the ... is referred to as: 1. Banner ads 2. Pop-up ads 3. A search engine 4. Apps

Last Answer : A search engine

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : How do you prevent a pop up banner?

Last Answer : There are programs that will stop a pop-up banner from appearing. One way you can avoid them is to check the settings on your antivirus software and/or firewall to block them.

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : Which type of technology will increase portability and mobility? a. Implant chips b. Micro‐payments c. Internet phone calls d. All of the above

Last Answer : d. All of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Which type of products is lesser purchased using ecommerce? a. automobiles b. books c. softwares d. none

Last Answer : a. automobiles

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : Which type of e‐commerce focuses on consumers dealing with each other? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : Which one is a graphic display on a webpage used for advertising? a. portal b. banner ad c. icon d. shopping cart

Last Answer : b. banner ad

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None

Last Answer : a. On Time Password

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b

Last Answer : d. Both a and b