____ attempts to match browsing behavior, user profiles, and buying habits with products.
A. Targeted marketing
B. Social networking
C. Click-through rating
D. Business-to-consumer analysis
Answer: A
Computer Science & Information Technology
You might also like to view...
A ___________ site can be running at a moment's notice if necessary.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.
A. Spoofing B. Phishing C. Impersonating D. Acting
Computer Science & Information Technology