Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 21 A(n) _____ refers to any symbol executed or adopted for the purpose of authenticating a writing. a. stamp b. signature c. mark d.

Question 21

  1. A(n) _____ refers to any symbol executed or adopted for the purpose of authenticating a writing.

    a.

    stamp

    b.

    signature

    c.

    mark

    d.

    icon

2 points

Question 22

  1. A(n) _____ statement is a statement that is false and that injures the reputation of another person or company.

    a.

    defamatory

    b.

    warranty disclaimer

    c.

    implied

    d.

    copyright

2 points

Question 23

  1. A(n) _____ tax is a tax levied by a state on property used in that state that was not purchased in that state.

    a.

    property

    b.

    use

    c.

    import

    d.

    sales

2 points

Question 24

  1. Customized pages provided by Web servers in response to specific queries from site visitors are called _____.

    a.

    Active Server Pages

    b.

    static pages

    c.

    dynamic content

    d.

    unchanged content

2 points

Question 25

  1. Disputes that arise when one person has registered a domain name that is an existing trademark or company name are settled by _____.

    a.

    the World Trade Organization

    b.

    the World Intellectual Property Organization

    c.

    statutory law

    d.

    common law

2 points

Question 26

  1. Efforts to reduce the environmental impact of large computing installations are called _____ computing.

    a.

    e-conserve

    b.

    e-wise

    c.

    efficient

    d.

    green

2 points

Question 27

  1. FreeBSD is a(n) _____-based operating system.

    a.

    Apple

    b.

    UNIX

    c.

    Linux

    d.

    Windows 2000 Server

2 points

Question 28

  1. If a company undertakes sufficient activities in a particular country, it establishes _____ with that country and becomes liable for filing tax returns in that country.

    a.

    terms of service

    b.

    notice

    c.

    jurisdiction

    d.

    nexus

2 points

Question 29

  1. If a defamatory statement injures the reputation of a product or service instead of a person, it is called _____.

    a.

    product disparagement

    b.

    trademark dilution

    c.

    negligent tort

    d.

    per se defamation

2 points

Question 30

  1. In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.

    a.

    server-level filtering

    b.

    server-side scripting

    c.

    client-side scripting

    d.

    client-level filtering

2 points

Question 31

  1. In _____, software operates on the browser to change what is displayed on the Web page in response to a users actions.

    a.

    server-side scripting

    b.

    static content generation

    c.

    client-side scripting

    d.

    basic content filtering

2 points

Question 32

  1. In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server.

    a.

    request message

    b.

    entity body

    c.

    request header

    d.

    request line

2 points

Question 33

  1. In a client/server architecture, the _____ contains a command, the name of the target resource, and the protocol name and version number.

    a.

    request header

    b.

    entity body

    c.

    request line

    d.

    response header

2 points

Question 34

  1. In a(n) _____ policy approach, a company that collects information does not use the information for any other purpose unless the customer specifically chooses to allow that use.

    a.

    fair-use

    b.

    opt-out

    c.

    opt-in

    d.

    lock-in

2 points

Question 35

  1. In the United States, federal courts have subject-matter jurisdiction over issues related to _____.

    a.

    professional licensing

    b.

    personal matters

    c.

    state tax matters

    d.

    bankruptcy

2 points

Question 36

  1. In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.

    a.

    benchmarking

    b.

    filtering

    c.

    monitoring

    d.

    response timing

2 points

Question 37

  1. The _____ is the part of the TCP/IP rules that defines the formats used to transfer files between TCP/IP-connected computers.

    a.

    white list spam filter

    b.

    File Transfer Protocol

    c.

    black list spam filter

    d.

    Microsoft Internet Information Server

2 points

Question 38

  1. The ability of a government to exert control over a person or corporation is called _____.

    a.

    notice

    b.

    subjugation

    c.

    legitimacy

    d.

    jurisdiction

2 points

Question 39

  1. The details of _____ vary from state to state, but generally create personal jurisdiction over nonresidents who transact business or commit tortious acts in the state.

    a.

    long-arm statutes

    b.

    forum selection

    c.

    statewide jurisdiction

    d.

    subject-matter jurisdiction

2 points

Question 40

  1. Using technology to harass, humiliate threaten or embarrass another person is called.

    a.

    sexting

    b.

    cyberbullying

    c.

    defamation

    d.

    online stalking

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management And Cost Accounting

Authors: Colin Drury

5th Edition

1861525362, 978-1861525369

More Books

Students also viewed these Accounting questions

Question

Under what circumstances is polygraph testing of employees legal?

Answered: 1 week ago