41) ________ is a component of a web address that maps to the unique IP address of the destination location.
A) Protocol identifier
B) File protocol
C) Registered domain name
D) Fragment identifier
42) Which of the following is NOT a function of the Internet Corporation for Assigned Names and Numbers (ICANN)?
A) overseeing the net’s naming system
B) settling disputes over domain names
C) establishing policies governing URL assignments
D) enforcing international anti-cybersquatting laws
43) When someone registers a domain name that is a company’s trademark, hoping to resell it to the company at an exorbitant profit, it is called ________.
A) phishing
B) cybersquatting
C) domain tasting
D) online identity-theft
44) Which of the following is an example of typosquatting?
A) A start-up investment company assumes the online identity of Arman & Company, a well established investment company, in social networking platforms for the purposes of acquiring its brand equity.
B) An environmental support group creates a spoof of the advertisement of a popular beverage company, highlighting its degradation of the environment by releasing waste products into the water bodies near its bottling plant.
C) A person registers a domain name, Tucson Multispeciality Clinic, which is the name of a popular multispeciality clinic hoping to to resell it to the clinic at an exorbitant profit.
D) A person registers the domain name “currentaffairs.net” to take advantage of the huge popularity of the e-newspaper currentaffairs.org to divert traffic to his webpage and make money by selling advertising space.
45) Registering a replica site with a misspelling in the trademark name that users might easily mistake for the real thing and displaying negative information about the actual company on the replica site is called ________.
A) brandjacking
B) online identity-theft
C) typosquatting
D) phishing
46) Allaboutgadgets.com, a review website for electronic gadgets, serves ads based on the location of the visitor. Which of the following is the most important factor that helps the site identify the visitor’s location?
A) the protocol identifier of the visitor
B) the IP address of the visitor
C) the top-level domain of the visitor
D) the web browser used by the visitor
47) A newly opened law firm in Kirkland decides to create a small website which provides a brief introduction of the firm, its mission, the contact information and address of the firm, and a client list. Which of the following information architectures would be most suitable for their website?
A) flat website architecture
B) hierarchical website architecture
C) multi-dimensional website architecture
D) sequential architecture
48) ________ is a website structure in which the top-level homepage contains links to second-level pages, which then link to further relevant pages.
A) Flat website architecture
B) Multi-dimensional website architecture
C) Hierarchical website architecture
D) Sequential architecture
49) Which of the following is a drawback of the hierarchical website architecture?
A) Four or five web pages are not enough to provide complete information to visitors.
B) Visitors may become frustrated at having to move through fixed steps.
C) It is difficult to locate information that doesn’t easily fit into, or that spans across, categories.
D) Creating multiple paths that link to each other through the site is expensive.
50) ________ is a website structure with several links to pages at all levels, allowing visitors correspondingly numerous paths through the site.
A) Multi-dimensional website architecture
B) Integrated website architecture
C) Sequential architecture
D) Hierarchical website architecture
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more