1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
9

Using your own words, explain how third-party cookies are created. Suppose you are an ad-serving company, and you maintain a log

of cookie data for ads you serve to Web pages for a particular vendor (say, Amazon). How can you use this data to determine which are the best ads
Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
7 0

Cookies are just pieces of code that exist in your computer’s web browsers and they store information that helps identify you and help enhance your experience online. third party cookies as compared to first party cookies are non-domain created and are used mostly for advertising. Generally, they are those creepy ads found on the left or right or at the top or bottom or top of most web pages. They target customers based on user behavior online. They are generated mostly when a website comes with sources from multiple sources. In the case of Amazon, for instance, its web pages are designed in a way that a few sections of these pages have ads from other third party companies. These third party companies are able to store their cookies on the user’s browser as third party cookies.

When the cookie is created on the browser, these third party companies logs these cookies as data on their servers. Once a user click on their ads, it will add that click to the log. This repeated algorithm helps these companies understand how users respond to certain ads and the various patterns in which users visit these sites where their ads are placed.

You might be interested in
Ummm, I hate to interrupt your day, but does anyone know where Mitch72 is????? Because he hasn't talked in a week, and he hasn't
Anettt [7]

Answer:

sorry but no

Explanation:

4 0
3 years ago
which button will allow you to insert quotes and notes into text into a document​ A comment B compare C research d margins
inysia [295]

Answer:

D margins

Explanation:

mark brainlist

3 0
3 years ago
What is the process called when programmers look for and fix errors in code?
AveGali [126]

Answer:

d

Explanation:

7 0
3 years ago
Read 2 more answers
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
gladu [14]
The answer is letter C.
3 0
3 years ago
Other questions:
  • Write a function getPigLatin(pigStr) that accepts pigStr as a parameter (a sentence as input) and converts each word to "Pig Lat
    8·1 answer
  • What is the importance of personal computers in connecting to the internet ?
    13·2 answers
  • The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted s
    9·1 answer
  • Database applications are seldom intended for use by a single user.
    15·1 answer
  • Why does a CPU need Thermal Grease?
    14·1 answer
  • How do you suppose a request travels from one computer to another? How does the request know where to go?
    8·1 answer
  • Carbohydrates are a huge source of
    7·2 answers
  • What are the different types of computer operating systems?
    6·1 answer
  • Can any software run on any processor
    5·1 answer
  • Intro Programming - Problem(s)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!