Deck 11: Digital Law and E-Commerce
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
Play
Full screen (f)
Deck 11: Digital Law and E-Commerce
1
E-mail contracts need not meet the Statute of Frauds requirements as long as they meet UCITA guidelines.
False
2
ISPs provide e-mail accounts,Internet access,and storage on the Internet to users.
True
3
LetsConnect is a three-month-old Internet service provider in the United States of America.In the last two months,it was discovered that several LetsConnect users exchanged online material that is illegal in the United States.The ISP took no measures to investigate the matter or prevent it.Which of the following is true of this case?
A)The users of LetsConnect are not liable for the material they exchanged.
B)The ISP is not liable for the content transmitted over its network.
C)The ISP will be prosecuted for abusing the freedom of speech.
D)The ISP will be prosecuted for violating the Communications Decency Act.
A)The users of LetsConnect are not liable for the material they exchanged.
B)The ISP is not liable for the content transmitted over its network.
C)The ISP will be prosecuted for abusing the freedom of speech.
D)The ISP will be prosecuted for violating the Communications Decency Act.
B
4
Parties enter into an electronic mail contract by the use of e-mail.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
The CAN-SPAM Act does not regulate spam sent to Americans from other countries.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
The World Wide Web consists of computers that support a standard set of rules for the exchange of information called File Transfer Protocol (FTP).
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements is true of e-mail contracts?
A)All e-mail contracts require consideration,capacity,and lawful object.
B)E-mail contracts are exempted from the requirements of the Statute of Frauds.
C)E-mail contracts are enforceable even if they do not meet the requirements of a traditional contract.
D)Several e-mails cannot be integrated to determine the parties' agreement.
A)All e-mail contracts require consideration,capacity,and lawful object.
B)E-mail contracts are exempted from the requirements of the Statute of Frauds.
C)E-mail contracts are enforceable even if they do not meet the requirements of a traditional contract.
D)Several e-mails cannot be integrated to determine the parties' agreement.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
Barney wants to rent an apartment and posts an advertisement in a classifieds website.Two days later,Michael,who wants to rent out his apartment,e-mails Barney and they finalize the deal over the Internet.Barney pays Michael through an online transfer.This is an instance of ________.
A)e-licensing
B)e-commerce
C)cybersquatting
D)information licensing
A)e-licensing
B)e-commerce
C)cybersquatting
D)information licensing
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true of the CAN-SPAM Act?
A)It regards spam e-mail as a punishable offence.
B)It prohibits spammers from sending sexually-explicit e-mail.
C)It approves businesses to use spam as long as they do not lie.
D)It provides a civil right of action to individuals who have received unsolicited spam.
A)It regards spam e-mail as a punishable offence.
B)It prohibits spammers from sending sexually-explicit e-mail.
C)It approves businesses to use spam as long as they do not lie.
D)It provides a civil right of action to individuals who have received unsolicited spam.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
The CAN-SPAM Act does not end spam but instead approves businesses to use spam as long as they do not lie.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is true of the Communications Decency Act of 1996?
A)Businesses can send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)Businesses are liable for invading the right to privacy if they send unsolicited e-mails.
D)The number of servers an ISP can access in a geographical location is limited.
A)Businesses can send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)Businesses are liable for invading the right to privacy if they send unsolicited e-mails.
D)The number of servers an ISP can access in a geographical location is limited.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following best describes the World Wide Web?
A)a connection of millions of computers that support a standard set of rules for the exchange of information
B)a network of millions of smaller networks,each with an independent set of standards
C)a connection of millions of computers across the world with no specific standards or time constraints for exchange of data
D)a world-wide network of millions of smaller networks with a different standard of information exchange in each country
A)a connection of millions of computers that support a standard set of rules for the exchange of information
B)a network of millions of smaller networks,each with an independent set of standards
C)a connection of millions of computers across the world with no specific standards or time constraints for exchange of data
D)a world-wide network of millions of smaller networks with a different standard of information exchange in each country
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
A(n)________ contract refers to a contract that is entered into by the parties by use of e-mail.
A)web
B)online
C)e-mail
D)ISP
A)web
B)online
C)e-mail
D)ISP
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is true of the World Wide Web?
A)Only businesses-not individuals-can have their own websites.
B)Individuals need not register with a service provider to access the web.
C)A website can have several online addresses.
D)Web pages are stored on servers which are operated by Internet service providers.
A)Only businesses-not individuals-can have their own websites.
B)Individuals need not register with a service provider to access the web.
C)A website can have several online addresses.
D)Web pages are stored on servers which are operated by Internet service providers.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
Most Web pages use electronic ordering systems that do not have the ability to evaluate and accept ________.
A)counteroffers
B)e-licenses
C)e-signatures
D)biometric data
A)counteroffers
B)e-licenses
C)e-signatures
D)biometric data
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
The term ISP refers to users who disguise computer viruses as executable programs and send them across the Internet.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
The computers that constitute the World Wide Web use a standard set of rules known as ________ for the exchange of information.
A)POP
B)POP3
C)HTTP
D)IMAP
A)POP
B)POP3
C)HTTP
D)IMAP
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
The E-SIGN Act is a not a federal statute,and state legislatures are required to adopt it in order for it to become state law.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is true of e-commerce?
A)Lessors cannot use web addresses to lease goods.
B)Intellectual property cannot be explicitly listed for sale on a website.
C)An e-mail contract is not binding.
D)Services can be listed for sale on websites.
A)Lessors cannot use web addresses to lease goods.
B)Intellectual property cannot be explicitly listed for sale on a website.
C)An e-mail contract is not binding.
D)Services can be listed for sale on websites.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
What measures has Congress taken to regulate spam e-mail?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
A ________ is an owner of intellectual property or information rights who transfers rights in the property or information to another party.
A)lessor
B)lessee
C)licensee
D)licensor
A)lessor
B)lessee
C)licensee
D)licensor
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
KCube Multimedia launches a new game.It permits Ken to download,install,and play the game for three months.This is an instance of a(n)________.
A)e-license
B)lease
C)domain name registration
D)digital signature
A)e-license
B)lease
C)domain name registration
D)digital signature
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is true of the UCITA?
A)It establishes a uniform set of rules that prohibit all forms of cybersquatting.
B)It establishes the Statute of Frauds for all online content.
C)It aims at eliminating all domain names registered in bad faith.
D)It becomes a law only when a state legislature enacts it as a statute.
A)It establishes a uniform set of rules that prohibit all forms of cybersquatting.
B)It establishes the Statute of Frauds for all online content.
C)It aims at eliminating all domain names registered in bad faith.
D)It becomes a law only when a state legislature enacts it as a statute.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
The World Wide Web consists of millions of computers that support a standard set of rules called ________ for the exchange of information.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
What is an exclusive license?
A)a license that grants access to exclusive information for a limited period
B)a license that restricts the licensee to some information only
C)a license that is granted to only one party for a specific period
D)a license that grants access to exclusive intellectual property
A)a license that grants access to exclusive information for a limited period
B)a license that restricts the licensee to some information only
C)a license that is granted to only one party for a specific period
D)a license that grants access to exclusive intellectual property
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
The CAN-SPAM Act requires spammers to label sexually oriented e-mails as such.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
Data and software do not constitute intellectual property or information rights.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is true of a license?
A)A license grants the licensee complete control over intellectual property.
B)An exclusive license is granted to only one licensee for a specific period.
C)A licensee has complete control over the information he or she is allowed to access.
D)A licensee has the right to use information rights beyond the licensor's control that are necessary to exercise the expressly described rights.
A)A license grants the licensee complete control over intellectual property.
B)An exclusive license is granted to only one licensee for a specific period.
C)A licensee has complete control over the information he or she is allowed to access.
D)A licensee has the right to use information rights beyond the licensor's control that are necessary to exercise the expressly described rights.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)________ is a contract whereby the owner of a software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.
A)e-license
B)Terms of Service document
C)domain
D)digital signature
A)e-license
B)Terms of Service document
C)domain
D)digital signature
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
A license is a contract that transfers complete rights in intellectual property and informational rights.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
While downloading a license to a software program,Harriet reads the "Terms of Agreement" document which states that the company is not liable for any unforeseen damages that arise from the software.Harriet clicks "Accept" and continues to install the program.The document is an example of a(n)________.
A)digital signature
B)digital identification
C)licensing agreement
D)implicit contract
A)digital signature
B)digital identification
C)licensing agreement
D)implicit contract
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
A ________ refers to a party who is granted limited rights in or access to intellectual property or information rights owned by another party.
A)lessor
B)lessee
C)licensee
D)licensor
A)lessor
B)lessee
C)licensee
D)licensor
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
The ________ is a federal statute that places certain restrictions on persons and businesses that send unsolicited commercial advertising to e-mail accounts,prohibits falsified headers,prohibits deceptive subject lines,and requires spammers to label sexually oriented e-mail as such.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ provides that Internet service providers are not liable for the content transmitted over their networks by e-mail users and websites.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)________ is any computer system that has been established by a seller to accept orders.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ refers to a contract that transfers limited rights in intellectual property and information rights.
A)contract
B)tender
C)license
D)domain name
A)contract
B)tender
C)license
D)domain name
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Counteroffers are not effective against electronic agents.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
The ________ establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement of computer information transactions.
A)CAN-SPAM Act
B)UCITA
C)ECPA
D)ACPA
A)CAN-SPAM Act
B)UCITA
C)ECPA
D)ACPA
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
The ________ is an electronic connection of millions of computers that support a standard set of rules for the exchange of information.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
The term ________ refers to an owner of intellectual property or informational rights who transfers rights in the property or information to another party.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
The ________ makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or on a server,or after receipt by the intended recipient.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
________ are state laws that require certain types of contracts to be in writing.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
A licensee is a party who is granted limited rights in intellectual property or information rights owned by another person or company.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
An exclusive license grants the licensee exclusive rights to use information rights for a specified duration.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)________ refers to a contract whereby the owner of a software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
What does the E-SIGN Act provide?
A)Contracts delivered electronically are denied effect.
B)Electronic records can be sent to consumers who make a purchase,without their specific consent to receiving the record.
C)An e-signature is treated the same as a pen-inscribed signature.
D)Only smart card verification creates a legally binding signature in cyberspace.
A)Contracts delivered electronically are denied effect.
B)Electronic records can be sent to consumers who make a purchase,without their specific consent to receiving the record.
C)An e-signature is treated the same as a pen-inscribed signature.
D)Only smart card verification creates a legally binding signature in cyberspace.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
The ECPA provides that stored electronic communications may be accessed by the party or entity providing the electronic communication service.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
The ________ recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.
A)Uniform Contracts Code
B)Uniform Computer Information Transactions Act
C)E-SIGN Act
D)Communications Decency Act
A)Uniform Contracts Code
B)Uniform Computer Information Transactions Act
C)E-SIGN Act
D)Communications Decency Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
Explain in brief the working of an e-license.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
Who among the following can access Henry's stored electronic communications without violating the ECPA?
A)Henry's colleague at work,who is working on the same project as Henry and needs the information.
B)Henry's wife,who suspects him of adultery.
C)Henry's boss,who suspects him of leaking confidential information.
D)Henry's personal financial advisor,who wants to see if he has sufficient funds to make an investment.
A)Henry's colleague at work,who is working on the same project as Henry and needs the information.
B)Henry's wife,who suspects him of adultery.
C)Henry's boss,who suspects him of leaking confidential information.
D)Henry's personal financial advisor,who wants to see if he has sufficient funds to make an investment.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
If Jim purchases an online license for a computer game,he is an e-licensor.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
The UCITA makes it illegal to access another person's stored e-mail.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
The term ________ refers to a party who is granted limited rights in or access to intellectual property or information rights owned by a licensor.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
The ________ is a model act that establishes a uniform and comprehensive set of rules that govern the creation,performance,and enforcement of computer information transactions.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
Jessica wants to buy a laptop from the website of CloudFive Computers.Before confirming the purchase,the website asks her to provide biometric identification using an electronic scanner.This is an example of a(n)________.
A)e-license
B)e-signature
C)exclusive license
D)conditional license
A)e-license
B)e-signature
C)exclusive license
D)conditional license
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
The ________ is a federal statute that makes it a crime to intercept an electronic communication at the point of transmission,while in transit,when stored by a router or server,or after receipt by the intended recipient.
A)UCITA
B)ECPA
C)ACPA
D)ICANN
A)UCITA
B)ECPA
C)ACPA
D)ICANN
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
A(n)________ grants the licensee exclusive rights to use information rights for a specified duration.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is true of the ECPA?
A)Businesses are allowed to send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)An e-signature is as effective as a pen-inscribed signature.
D)It is a crime to intercept an electronic communication at the point of transmission.
A)Businesses are allowed to send spam e-mails,as long as they do not lie.
B)ISPs are not liable for the content transmitted over their networks by e-mail users and websites.
C)An e-signature is as effective as a pen-inscribed signature.
D)It is a crime to intercept an electronic communication at the point of transmission.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
The ________ gives an e-signature the same force and effect as a pen-inscribed signature on paper.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
A)UCITA
B)ACPA
C)ICANN
D)ECPA
A)UCITA
B)ACPA
C)ICANN
D)ECPA
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
The .org domain name extension represents a resource website.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
What is cybersquatting? Can trademark owners recover domain names registered in bad faith?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
The ________ issued new rules that permit a party to register a domain name with new TLD suffixes that are personalized.
A)UCITA
B)ACPA
C)ICANN
D)ECPA
A)UCITA
B)ACPA
C)ICANN
D)ECPA
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
The ACPA is federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
Registering a domain name of another party's trademarked name or famous person's name is called cybersquatting.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following domain extensions signifies a resource website?
A).com
B).org
C).edu
D).info
A).com
B).org
C).edu
D).info
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
The Anticybersquatting Consumer Protection Act (ACPA)is a federal statute that makes the misrepresentation of another person,business or organization using inappropriate words,imagery or other media illegal.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
The ________ permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
Registering a domain name of another party's trademarked name or famous person's name in bad faith is called ________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
A(n)________ uniquely identifies an individual's or company's website.
A)e-signature
B)digital footprint
C)e-mail address
D)domain name
A)e-signature
B)digital footprint
C)e-mail address
D)domain name
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
.bz is a restricted domain extension and can only be used by businesses or organizations in Brazil.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
Jonathan Smith,a neurosurgeon in Oregon,wants to start a website that makes it possible for neurosurgeons across the world to work collaboratively on medical cases.Which of the following domain name extensions is most appropriate for Smith's website?
A).com
B).org
C).edu
D).pro
A).com
B).org
C).edu
D).pro
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
A network extension is a unique name that identifies an individual's or company's website.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
The .biz extension is used for large-business and corporate websites.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
Joan reads e-mails from Harold's personal e-mail folder.Which statute has Joan violated and why? Under what circumstances is she permitted to read Harold's e-mail?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
________ is the most widely used domain extension in the world.
A).net
B).com
C).biz
D).org
A).net
B).com
C).biz
D).org
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is the first step in registering a domain name?
A)determining whether any other party already owns the name
B)determining if the name does justice to the image of the company or individual
C)finding an extension that attracts maximum web traffic
D)enrolling with a service provider to host the website
A)determining whether any other party already owns the name
B)determining if the name does justice to the image of the company or individual
C)finding an extension that attracts maximum web traffic
D)enrolling with a service provider to host the website
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck

