____ attempts to match browsing behavior, user profiles, and buying habits with products.

A. Targeted marketing
B. Social networking
C. Click-through rating
D. Business-to-consumer analysis


Answer: A

Computer Science & Information Technology

You might also like to view...

What is network latency and what should you look for in a Wireshark capture to determine latency?

What will be an ideal response?

Computer Science & Information Technology

Your organization is concerned about the bring your own device (BYOD) trend. You need to ensure that any BYOD devices that are deployed on the enterprise have the appropriate security controls in place. Which of the following should you do to provide this?

A. Change all the user passwords for BYOD users. B. Set up a separate account to be used by BYOD users. C. Implement NAC rules. D. Deploy a router that isolates the BYOD devices on their own subnet.

Computer Science & Information Technology

To organize your diagnostic process when tracing cabling, use these very simple aids to keep track of your progress on the patch panel. Hint: You can purchase these at any office supply store.

A. multimeter B. labels C. voltage event recorder D. Fox and Hound

Computer Science & Information Technology

Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to occur most often around midday. Which of the following is the MOST likely cause?

A. There is interference from small appliances B. The signal coverage area is too small C. Not enough DHCP addresses have been allotted D. The DNS cache on the users' computers has become corrupt

Computer Science & Information Technology