Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

10 1. W_h_a_t_ _d_o_e_s_ _p_r_o_j_e_c_t_ _s_c_o_p_e_ _r_e_fer to? a. The projects length b. The projects complexity c. The projects budget d. All of the above

10 1. W_h_a_t_ _d_o_e_s_ _p_r_o_j_e_c_t_ _s_c_o_p_e_ _r_e_fer to? a. The projects length b. The projects complexity c. The projects budget d. All of the above 2. When people scan website content, the direction their eyes move in can be described as the a. A-shaped pattern b. C-shaped pattern c. F-shaped pattern d. L-shaped pattern 3. N_e_g_a_t_i_v_e_ _space_ _is_ _often_ _a_l_s_o_ _called_ _. a. White space b. Black space c. Neutral space d. Single space 4. Why is it especially important that the copy on a websites services page be interesting? a. Because it is the first page a reader will look at b. Because the reader is already interested in what the company is offering c. Because it is the last page a reader will look at d. None of the above 5. O_n_ _a_ _d_i_g_i_t_a_l_ _m_a_r_k_e_t_i_n_g_ _a_g_e_n_c_y_s_ _w_e_b_s_i_t_e_,_ _w_h_a_t_ _i_n_t_e_r_n_a_l_ _c_o_n_t_e_n_t_ _m_i_g_h_t_ _h_y_p_e_r_l_i_n_k_s_ _c_o_n_n_e_c_t_ _t_h_e_ _reader to? a. LinkedIn pages of company employees b. A clients website c. CTA pages d. All of the above 6. When online data is changed into code, it is called . a. cryptal b. procryptic c. decrypted d. encrypted 7. What does this symbol: m_e_a_n_ _w_h_e_n_ _i_t_ _i_s_ _d_i_s_p_l_a_y_e_d_ _n_e_x_t_ _t_o_ _a_ _w_e_b_s_i_t_e_s_ _U_R_L_?_ _ a. The site is secure. b. The site is trademarked. c. The site is not secure. d. The site is unable in your country. 8. Which of the following is not a company-owned digital asset? a. A case study b. A video recording c. A computer d. A web server 9. Scenario: A jewelry store owner wants to market her diamond rings to engaged couples. She c_r_e_a_t_e_s_ _t_w_o_ _d_i_f_f_e_r_e_n_t_ _v_e_r_s_i_o_n_s_ _o_f_ _h_e_r_ _w_e_b_s_i_t_e_s_ _h_o_m_e_ _p_a_g_e_._ _T_h_e_ _f_i_r_s_t_ _i_n_c_l_u_d_e_s_ _a_ _p_i_n_k_,_ _s_e_r_i_f_ _typeface for all headers. The second uses a blue serif typeface for all headers. Each is used for one month. Using Google Analytics, the owner can find out which of these two pages is more effective at driving business. The experiment the owner conducted is referred to as testing. a. A/B b. Separation c. Pen d. None of the above 10. How do B2B and B2C business differ when it comes to their sales processes? a. B2C is typically more complex than B2B. b. B2B is typically more complex than B2C. c. It takes longer for a sale to be generated in B2C than in B2B. d. None of the above Section Two: Fill in the Blanks /15 Complete each statement with the correct word(s). Write in the space(s) provided. All questions are worth one mark, unless otherwise indicated. 1. badges, badges, and badges are all examples of trust symbols. (3 marks) 2. images are often in a .jpg file format and images are often in a .pdf format. (2 marks) 3. security involves the actions and methods employed in an a_t_t_e_m_p_t_ _t_o_ _p_r_o_t_e_c_t_ _t_h_e_ _c_o_m_p_a_n_y_s_ _d_i_g_i_t_a_l_ _f_i_l_e_s_ _a_n_d_ _o_n_l_i_n_e_ _p_r_o_p_e_r_t_y_._ _

4. The two kinds of threats that exist against digital assets are loss and loss. (2 marks)

5. is a web-based tool that detects plagiarism online.

6. is perhaps the most successful CRM on the market today.

7. The HTML tag is used to put text in .

8. The HML tag is used to bold text.

9. makes up the image color on monitors.

10. The principal source of income for a blog is . Section Three: Short Answer /10 Respond to the following questions in the space provided. You may write in point form. 1. What are three tips you would give to a company that is trying to select an effective domain name? (3 marks) 2. What are four ways in which HTML5 has improved upon its previous iterations? (4 marks) 3. What are three characteristics of a strong online password? (3 marks) Section Four: Examining a Blog Post /10 Your instructor will provide you with a blog post written for a B2C company. Read the post and note down five words or phrases you would tag in WordPress. Then, note three sites you would hyperlink to in the post (You do not need to note specific URLs). Finally, identify the primary keyword utilized in the post, along with one secondary keyword. Tags: 1. 2. 3. 4. 5. Hyperlinks: 1. 2. 3. Primary keyword: Secondary keyword:

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Audit Value Factor Making Managements Head Turn Internal Audit And IT Audit Series

Authors: Daniel Samson

1st Edition

1138198129, 978-1138198128

More Books

Students also viewed these Accounting questions

Question

Define personal and dependency exemptions.

Answered: 1 week ago

Question

6. Identify seven types of hidden histories.

Answered: 1 week ago

Question

What is human nature?

Answered: 1 week ago