Description : What type of ad appears under a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad
Last Answer : a. pop‐under ad
Description : What type of ad appears on top of a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad
Last Answer : b. pop‐up ad
Description : Which type of add appears on a web page? a. pop‐under ad b. Pop‐up ad c. Banner ad d. Discount ad
Last Answer : c. Banner ad
Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing
Last Answer : c. Affiliate programs
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : Which types of ad appears on a web page? a) Pop-under ad b) Pop-up ad c) Banner ad d) Discount ad
Last Answer : c) Banner ad
Description : This operates algorithmically or using a mixture of algorithmic and human input to collect, index, store and retrieve information on the web (e.g. web pages, images, information and other types of files). It makes the ... is referred to as: 1. Banner ads 2. Pop-up ads 3. A search engine 4. Apps
Last Answer : A search engine
Description : Which type of ad appears on a top of a web page? a. pop-under ad b. pop-up ad c. banner ad d. discount ad
Last Answer : b. pop-up ad
Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing
Last Answer : d. Virtual marketing
Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above
Last Answer : b. Click‐through
Description : Do you need to have a minimum amount of site traffic to have Google Adsense (including Google banner ads from adsense) to have this service on your website?
Last Answer : I don’t think it matters, you just won’t make much money.
Description : What's the average CPM for banner ads?
Last Answer : It depends on the traffic. Not only how many, but also if they are recurring or new. Do you know the rate of unique users, in relation to repeats? Most ads I’ve seen cost a few cents per viewing, with an additional charge per click.
Description : How much does Wap4dollar pay per click on banner ads ?
Last Answer : Wap4dollar 's link pays 00 0.0033 per click .
Description : Usually downloaded into folders that hold temporary internet files, _____ are written to your computer's hard disk by some of the websites you visit. a) anonymous files b) behaviour files c) banner ads d) cookies e) None of these
Last Answer : d) cookies
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : b. Accessibility
Description : Which of the following is part of the four main types for e‐commerce? a. B2B b. B2C c. C2B d. All of the above
Last Answer : d. All of the above
Description : How much are you willing to tolerate for love?
Last Answer : I draw the line at anything that isn't safe, calm or loving. Calling me names? Not love. Putting me down? Not love. I'll ride the second red flag I see, and high tail it out of town. ... too many assholes using the mantle of false love. Too many awesome people in the world to stay with one jackass.
Description : How do you prevent a pop up banner?
Last Answer : There are programs that will stop a pop-up banner from appearing. One way you can avoid them is to check the settings on your antivirus software and/or firewall to block them.
Description : Which one is a graphic display on a webpage used for advertising? a. portal b. banner ad c. icon d. shopping cart
Last Answer : b. banner ad
Description : Which of the following can be used to help identify people in a crowd? a. Biochip b. Implant chip c. Facial recognition software d. Vision chip
Last Answer : c. Facial recognition software
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above
Last Answer : c. People outside the organization can't access it
Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above
Last Answer : c. all of the above
Description : Which products are people most likely to be comfortable buying on the Internet? a. Books b. PCs c. CDs d. All of the above
Description : Which products are people most likely to be more uncomfortable buying on the Internet? a. Books b. Furniture c. Movies d. All of the above
Last Answer : b. Furniture
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Last Answer : d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b