Question
Question 21 A(n) _____ refers to any symbol executed or adopted for the purpose of authenticating a writing. a. stamp b. signature c. mark d.
Question 21
-
A(n) _____ refers to any symbol executed or adopted for the purpose of authenticating a writing.
a. stamp
b. signature
c. mark
d. icon
2 points
Question 22
-
A(n) _____ statement is a statement that is false and that injures the reputation of another person or company.
a. defamatory
b. warranty disclaimer
c. implied
d. copyright
2 points
Question 23
-
A(n) _____ tax is a tax levied by a state on property used in that state that was not purchased in that state.
a. property
b. use
c. import
d. sales
2 points
Question 24
-
Customized pages provided by Web servers in response to specific queries from site visitors are called _____.
a. Active Server Pages
b. static pages
c. dynamic content
d. unchanged content
2 points
Question 25
-
Disputes that arise when one person has registered a domain name that is an existing trademark or company name are settled by _____.
a. the World Trade Organization
b. the World Intellectual Property Organization
c. statutory law
d. common law
2 points
Question 26
-
Efforts to reduce the environmental impact of large computing installations are called _____ computing.
a. e-conserve
b. e-wise
c. efficient
d. green
2 points
Question 27
-
FreeBSD is a(n) _____-based operating system.
a. Apple
b. UNIX
c. Linux
d. Windows 2000 Server
2 points
Question 28
-
If a company undertakes sufficient activities in a particular country, it establishes _____ with that country and becomes liable for filing tax returns in that country.
a. terms of service
b. notice
c. jurisdiction
d. nexus
2 points
Question 29
-
If a defamatory statement injures the reputation of a product or service instead of a person, it is called _____.
a. product disparagement
b. trademark dilution
c. negligent tort
d. per se defamation
2 points
Question 30
-
In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.
a. server-level filtering
b. server-side scripting
c. client-side scripting
d. client-level filtering
2 points
Question 31
-
In _____, software operates on the browser to change what is displayed on the Web page in response to a users actions.
a. server-side scripting
b. static content generation
c. client-side scripting
d. basic content filtering
2 points
Question 32
-
In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server.
a. request message
b. entity body
c. request header
d. request line
2 points
Question 33
-
In a client/server architecture, the _____ contains a command, the name of the target resource, and the protocol name and version number.
a. request header
b. entity body
c. request line
d. response header
2 points
Question 34
-
In a(n) _____ policy approach, a company that collects information does not use the information for any other purpose unless the customer specifically chooses to allow that use.
a. fair-use
b. opt-out
c. opt-in
d. lock-in
2 points
Question 35
-
In the United States, federal courts have subject-matter jurisdiction over issues related to _____.
a. professional licensing
b. personal matters
c. state tax matters
d. bankruptcy
2 points
Question 36
-
In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.
a. benchmarking
b. filtering
c. monitoring
d. response timing
2 points
Question 37
-
The _____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.
a. white list spam filter
b. File Transfer Protocol
c. black list spam filter
d. Microsoft Internet Information Server
2 points
Question 38
-
The ability of a government to exert control over a person or corporation is called _____.
a. notice
b. subjugation
c. legitimacy
d. jurisdiction
2 points
Question 39
-
The details of _____ vary from state to state, but generally create personal jurisdiction over nonresidents who transact business or commit tortious acts in the state.
a. long-arm statutes
b. forum selection
c. statewide jurisdiction
d. subject-matter jurisdiction
2 points
Question 40
-
Using technology to harass, humiliate threaten or embarrass another person is called.
a. sexting
b. cyberbullying
c. defamation
d. online stalking
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started