In: Computer Science
Question 86
Which of the following is an example of a newsfeed using pull technology?
| a. | 
 | 
|
| b. | 
 | 
|
| c. | 
 Usenet  | 
|
| d. | 
 Google Chat  | 
1 points
Question 87
Windows Live Messenger has been replaced with _____.
| a. | 
 AIM  | 
|
| b. | 
 Skype  | 
|
| c. | 
 Yahoo! Messenger  | 
|
| d. | 
 ICQ  | 
1 points
Question 88
You can listen to or watch a podcast on a _____.
| a. | 
 computer  | 
|
| b. | 
 smartphone  | 
|
| c. | 
 tablet  | 
|
| d. | 
 all of the above  | 
1 points
Question 89
YouTube was started in ____ as a private venture.
| a. | 
 2003  | 
|
| b. | 
 2005  | 
|
| c. | 
 2001  | 
|
| d. | 
 2007  | 
1 points
Question 90
____ allows users to send very short messages to others who are connected to the network using smartphones or other Internet devices.
| a. | 
 Text messaging  | 
|
| b. | 
 Podcasting  | 
|
| c. | 
 Posting  | 
|
| d. | 
 Email messaging  | 
1 points
Question 91
____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables.
| a. | 
 Clickstream  | 
|
| b. | 
 Static  | 
|
| c. | 
 Graphic  | 
|
| d. | 
 Active content  | 
1 points
Question 92
____ encryption uses a single key that both the sender and receiver know.
| a. | 
 Private-key  | 
|
| b. | 
 Asymmetric  | 
|
| c. | 
 Man-in-the-Middle  | 
|
| d. | 
 Public-key  | 
1 points
Question 93
____ is a general category of software that includes advertisements to pay for the product for which it appears.
| a. | 
 Bugware  | 
|
| b. | 
 Abandonware  | 
|
| c. | 
 Adware  | 
|
| d. | 
 Spyware  | 
1 points
Question 94
____ is a general term for the process of verifying the identity of a person or a website.
| a. | 
 Authentication  | 
|
| b. | 
 Firewalling  | 
|
| c. | 
 Inspection  | 
|
| d. | 
 Spoofing  | 
1 points
Question 95
____ is a photo-sharing site.
| a. | 
 Sight-Flight  | 
|
| b. | 
 Flickr  | 
|
| c. | 
 Pickr  | 
|
| d. | 
 Pixar  | 
1 points
Question 96
____ is a process that hides encrypted messages within different types of files.
| a. | 
 Stenagography  | 
|
| b. | 
 Stenography  | 
|
| c. | 
 Stegography  | 
|
| d. | 
 Steganography  | 
1 points
Question 97
____ keys exist only during a single connection between a browser and a server.
| a. | 
 Public  | 
|
| b. | 
 Private  | 
|
| c. | 
 Session  | 
|
| d. | 
 none of the above  | 
1 points
Question 98
____ software manages the schedule for downloading podcast files to your device.
| a. | 
 Webplanning  | 
|
| b. | 
 Webcatcher  | 
|
| c. | 
 Podcatcher  | 
|
| d. | 
 Podplanning  | 
1 points
Question 99
____ was the first to make APIs available to other developers.
| a. | 
 YouTube  | 
|
| b. | 
 Craigslist.com  | 
|
| c. | 
 Amazon.com  | 
|
| d. | 
 eBay  | 
1 points
Question 100
_____ is a photo-sharing site and a social network.
| a. | 
 | 
|
| b. | 
 Google+  | 
|
| c. | 
 Flickr  | 
|
| d. | 
 Shutterfly  |