Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question 1. A way to ensure that a company's site is on the first page users see when looking for a specific term is using __________ advertising.

A. stealth

B. viral

C. buzz

D. search

Question 2. Which of the following is likely to have the suffix ".edu" after the domain name in its URL?

A. Yahoo!

B. UNICEF

C. The Federal Reserve

D. Harvard Business School

Question 3. Which of the following computer networks is used for providing wireless communication between devices, using technologies such as Bluetooth?

A. Personal area network

B. Storage area network

C. Campus area network

D. Metropolitan area network

Question 4. Which of the following types of e-auction fraud is associated with the seller's failure to ship an item after the payment has been received?

A. Bid luring

B. Bid shielding

C. Non-shipment

D. Shipping fraud

Question 5. The protocol used by the Internet is called the:

A. Transmission Control Protocol (TCP).

B. Dynamic Host Configuration Protocol (DHCP).

C. Address Resolution Protocol (ARP).

D. Trivial File Transfer Protocol (TFTP).

Question 6. With respect to consumer-to-business e-commerce, __________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.

A. nearshoring

B. insourcing

C. offshoring

D. crowdsourcing

Question 7. With respect to typical revenue models for electronic commerce businesses, PayPal.com, eBay.com, and Groupon.com are using a(n) __________ revenue model.

A. transaction fees

B. licensing

C. affiliate marketing

D. traditional sales

Question 8. With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) __________ revenue model.

A. subscription

B. licensing

C. affiliate marketing

D. brokerage

Question 9. Within the context of different types of e-auction fraud, bid shielding is sometimes called:

A. bid skimming.

B. bid luring.

C. reverse bidding.

D. shill bidding.

Question 10. EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?

A. The company has limited access to funds and is looking to keep its costs low.

B. The public is wary of sharing confidential information after a recent spate of credit card scandals.

C. A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain.

D. Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts

Question 11. With respect to computer networks, a typical __________ area network has a bandwidth of 10 Mbps to 1 Gbps.

A. personal

B. metropolitan

C. local

D. campus

Question 12. Which of the following statements is true about the platform as a service model?

A. The customer is provided with the basic capabilities of processing, storage, and networking.

B. The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

C. The customer can run his or her own applications that are typically designed using tools provided by the service provider.

D. Only the basic capabilities of processing, storage, and networking are provided.

Question 13. Doug is a frequent visitor of online auction sites. He uses two different accounts to place a low followed by a very high bid on the desired item. This leads other bidders to drop out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as:

A. shill bidding.

B. bid luring.

C. rafter bidding.

D. mystery bidding

Question 14. Which of the following statements is true about electronic commerce?

A. Business-to-business is by far the largest form of electronic commerce in terms of revenues.

B. Electronic commerce is limited to transactions between businesses and consumers.

C. Electronic commerce between businesses and their employees is impossible.

D. All forms of electronic commerce involve business firms.

Question 15. With regard to the World Wide Web, Web pages are stored on Web:

A. consoles.

B. rings.

C. consortiums.

D. servers.

Question 16. Which of the following is a disadvantage of e-tailing?

A. It is limited by physical store and shelf space restrictions.

B. It requires additional time for products to be delivered.

C. It complicates the process of comparison shopping.

D. It restricts companies to effectively compete on price.

Question 17. Which of the following statements is true about a public cloud?

A. It gives the organization a high degree of customizability over their data and applications.

B. It can be used by any interested party on a pay-per-use basis.

C. It is internal to an organization.

D. It does not free an organization from the issues associated with managing the cloud infrastructure.

Question 18. A hypertext document is otherwise known as a:

A. Web page.

B. Web host.

C. Web ring.

D. Webmaster

Question 19. __________ is used to transmit voice and video communication over the Internet.

A. Edge computing

B. IP convergence

C. Distributed computing

D. IP routing

Question 20. Which of the following occurred in the 1946-1958 generation of computing?

A. The interpersonal computing era ended and the internetworking era began.

B. The internetworking era ended.

C. The mainframe era began.

D. The mainframe era ended and the personal computer era began.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91784582
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Suppose there is no inflation and an insurance company

Suppose there is no inflation and an insurance company offers a contract that would pay $500,000 with certainty 50 years from now. What is the most that this contract would be worth today if: 1. The rate of interest is 7 ...

Network requirement analysis and planpurpose of the

Network requirement analysis and plan Purpose of the assessment (with ULO Mapping) Main objective of this assignment is to enable student to understand networking devices, gather requirements for a given business case st ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Assignment wireless applications advances advantages and

Assignment : Wireless Applications, Advances, Advantages, and Disadvantages The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, im ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As