Marty included a banner ad for her online MP3 player store on a music download Web site. She found that 72 percent of users who visited the site via banner ad click through became customers. Which of the following is the term for this percentage?
A. Exposure rate
B. Purchase rate
C. Conversion rate
D. Clickthrough rate
Which of the following describes a root certificate authority (CA)?
A. A CA that cannot be brought offline
B. A CA that has an unlimited validity period
C. A CA that uses LDAP to transmit its credentials to other CAs
D. A CA that signs its own certificate and certifies itself as legitimate
The certificate authority (CA) cryptographically signs a certificate file with its private key. Anyone can verify the certificate signature with the public key. This is known as:
A. hash encryption.
B. binary-key encryption.
C. symmetric-key encryption.
D. asymmetric-key encryption.
To perform at the maximum level of security, digital certificates must be:
A. guaranteed by VeriSign.
B. issued by a trusted third party.
C. verified digitally by a notary public.
D. issued 30 days before the site goes live.
What are the basic steps for retrieving data for display?
A. Predefine SQL strings, authenticate, format for display.
B. Define the server name, name the database, authenticate the credentials.
C. Connect to a database server, pass the SQL command, retrieve the results.
D. Authenticate to a database server, format for display, retrieve the data results.
Which of the following is a disadvantage of an online storefront?
A. High software costs
B. Difficulty of administration
C. Lack of control over security
D. Specialized hardware requirements
Which of the following marketing models is characterized by a complementary venture between two or more companies that join together in production, distribution or marketing in order to achieve individual goals?
A. B2C market
B. Open market
C. Vertical market
D. Horizontal market
Which of the following is a messaging protocol designed to ensure the integrity of data sent between incompatible computers?
A. Electronic Data Interface
B. Electronic Data Interchange
C. Electronic Description Interface
D. Electronic Download Instruction
Which of the following is commonly used to authenticate a customer who has just used a credit card to buy a product?
A. The customer's signature
B. Secure Sockets Layer (SSL)
C. The customer's card security code
D. A payment gateway for verifying the customer's address
Tom has encountered a problem with the Apache server installation on his company's server. Because he does not have an immediate solution to the problem, he should contact:
A. the Apache Help desk.
B. the Apache service staff.
C. the Apache live Help service.
D. the Apache user online forum.