Comp. literacy quiz

Assignment Help Basic Computer Science
Reference no: EM13759862

Comp. Literacy Quiz

Need answers in 6 hours, no excuses please. 90% will earn 5 star rating.

1. Google's main model for generating profit is: 

Searches.

Indexing.

Applications.

AdWords.

Question 2. 2. Of the following individuals, who was the most recent to develop information searching tools online?

Otlet

Wells

Bush

Brin

Question 3. 3. While doing online research you enter this wildcard character: M ? Which of the following would be a possible response to your search?

Meet

Feet

Beat

Meat

Question 4. 4. While doing online research you enter this keyword search with a truncation character: man* Which of the following would not be a possible response to your search?
Mansion

Men

Mantle

Manny

Question 5. 5. Famed science fiction writer H. G. Wells once envisioned something to store vast amounts of information. What did he call it?

World Brain

World Wide Web

Universal Decimal Classification

Universal Database System

Question 6. 6. When a video becomes so popular online that people begin tweeting, blogging, and emailing their friends about it, it is called:

gossip.

hits.

viral.

infectious .

Question 7. 7. Which of the following was the first commercial software package to incorporate WYSIWYG as a feature?

WordStar

Framework

Word

WordPerfect

Question 8. 8. Information resources that point the user towards data that they are looking for, and are organized according to a predefined scheme are called:

encyclopedias.

metadata.

markups.

search engines.

Question 9. 9. If you wanted to look up an article from the Chicago Tribune the best place to start would be:

EBSCOHost.

JSTOR.

ProQuest.

NewsBank.

Question 10. 10. Which of the following locations represents the greatest danger in encountering misinformation?

Library

Blogs

University press

Peer reviewed journal

Reference no: EM13759862

Questions Cloud

Different software development methods : Compare and contrast at least three (3) different software development methods. Explain why the testing of software products is of great importance
What is the highest price you can charge : How many servings will Nina buy for Braden? How much consumer surplus does he receive - What is the highest price you can charge for the "all-you-can-eat" special and still attract customers?
What are the archetypal symbols in this excerpt : What are the archetypal symbols in this excerpt? What role does the dialect play in the story? Humor? What is innovative about Twain's techniques in The Adventures of Huckleberry Finn?
Plant research plant : Treatments and cures,Medical evidence for efficacy: scientific studies and clinical trials
Comp. literacy quiz : Need answers in 6 hours, no excuses please. 90% will earn 5 star rating.
The role of federal agencies in fighting digital crime : The Role of Federal Agencies in Fighting Digital Crime, Discuss how the U.S. could align these efforts to better protect the nation against digital crimes and terrorism
What are the similarities between three liberal philosophers : What are the similarities and differences between the three liberal philosophers we have discussed so far, ie. Locke, Montesquieu and J.S. Mill? Discuss."
Future interdepartmental negotiations : What is the difference between bargaining and negotiation? Why must successful negotiations involve both tangible and intangible components? Do you think that ACME needs to pursue an integrative or a distributive approach to their future interde..
How is xuanzang changed by the journey to the west : How is Xuanzang changed by the journey to the west?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What do you think of ai

What do you think of AI. Do you exalt AI? Do you think that there are also dangers involved? Please discuss the benefits and the perils of artificial intelligence and everything about AI.

  Compare the athlete''s time of each event

The class should have static data members of 60 minutes. This is the maximum time of any one event. Compare the Athlete's time of each event to the static data member. If the athlete's time exceeds the 60 minutes, output a message that they are di..

  What type of damage these computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  What software applications

If you were tasked with assembling a 'toolkit' using only free or open source tools to perform network security assessment. (1)What software applications or "tools" would you use?

  Create a class called word

Create a function display(string) which prints to the file with name equal to the string parameter, an alphabetical list of all words contained in the list along with the number of times they appeared in the input file.

  List all the possible techniques that you might use

Elmwood College Situation: The school is considering a new system that will speed up the registration process. As a systems analyst, you are asked to develop a plan for fact-finding.

  Create a new workbook that jobs performed by a company

create a new workbook that will be used to record the jobs performed and charges generated by a landscaping company. In the first worksheet, create columns for the employees of your landscaping business

  What value is read into the variables by the following code

What value is read into the variables by the following code?

  Provide an explanation of hashtables

Provide an explanation of hashtables, including a description of a realistic scenario that could be solved with the application of a hashtable

  What security concerns might arise over mobile access

What security concerns might arise over mobile access to private corporate information

  What decimal number would the ieee 754

What decimal number would the IEEE 754 single precision floating point number 0xCAE80000 (this is in hex) be? Write your final answer in scientific notation as m x 10 p where p is an integer.

  Calculate the net expected value for the project risks

Calculate the net expected value for the project risks and opportunities cited above. How much should you plan for your contingency reserve budget based on the above?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd