____ attempts to match browsing behavior, user profiles, and buying habits with products.

A. Targeted marketing
B. Social networking
C. Click-through rating
D. Business-to-consumer analysis

Answer: A

Computer Science & Information Technology

You might also like to view...

A ___________ site can be running at a moment's notice if necessary.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

A. Spoofing B. Phishing C. Impersonating D. Acting

Computer Science & Information Technology