Social networking
Digital marketing
Data
Frontend / backend development
Security
100

UGC

What is the acronym for ‘user-generated content’ ?

100

They are words or phrases commonly used in search engines to look for online content.

What are 'keywords'?

100

It is a term for collections of data that are so large they can’t be processed through traditional data processing systems.

What is 'Big Data'?

100

They are coding mistakes or unwanted pieces of code that keep a website or program from working properly.

What are bugs?

100

It is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.

What is 'phishing'?

200

It is a measure of your potential social media audience size—it’s the number of people who have access to your content.

What does 'reach' refer to?

200

CTA

What is the acronym usually used for 'Call to Action'?

200

It is a supervised learning process for identifying the category data belong to.

What is 'classification'?

200

API

What is the acronym for 'Application Programming Interface'?

200

It is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources you should not have access to.

What is 'privilege escalation'?

300

It is the term used for likes, shares, comments, and other interactions with a business’s social media presence.

What is social media 'engagement'?

300

It is the percentage of visitors to a website who leave the website quickly without really looking at it.

What is the 'bounce rate'?

300

It is an approach to computing based on "degrees of truth" rather than the usual Boolean logic.

What is 'fuzzy logic'?

300

They are HTML elements that provide information to the web browser processing the page as well as the developer building it. Examples: <header>, <section>, and <article>.

What are 'semantic elements'?

300

It is the process of reducing risk by minimizing vulnerabilities or the impact of a potential attack through the application of proper controls.

What is 'risk mitigation'?

400

It is an instance in which a specific element (such as an advertisement) is displayed on a web page accessed by a user

What is an 'impression'?

400

It is the process by which an entity or a person earns a commission for marketing another person's or company's products.

What is 'affiliate marketing'?

400

It is an unsupervised learning process for identifying similarities between objects.

What is 'clustering'?

400

They are are the HTML elements used to organize the content of a web page, like <div> and <span>.

What are 'structural elements'?

400

It is a decoy system intended to attract attackers so that the attack will be detected or the attackers will be kept away from actual systems.

What is a 'honeypot'?

500

It is the name of the process social media sites use to gather and present content (articles, links, videos, images, etc.) that are relevant to a specific topic or a user’s area of interest.

What is 'content curation'?

500

It is a marketing term that describes the graphic representation businesses use to map out the journey that customers go through, from awareness of the product down to making (or not) a purchase.

What is a 'sales funnel'?

500

It is the skeleton structure that represents the logical view of a database.

What is a 'schema'?

500

They are HTML elements that don’t appear visibly for the user on a webpage, but give the web browsers additional information about the page—keywords, author of the document, last modified, etc.

What are 'meta elements'?

500

It is an international standard entitled: 'Information technology — Security techniques — Information security management systems — Overview and vocabulary' and describes the purpose of an ISMS.

What is the ISO/IEC 27000 series of standards?

M
e
n
u