Exam 15: Evaluating Electronic Information

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Links that are no longer active are called "____."

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

____________________ is the unauthorized copying of software.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

Software piracy

____ is the ability to use links to move through a site.

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

A

If the domain portion of a Web site is ____, the site is used for government resources.

(Multiple Choice)
4.8/5
(34)

A very important consideration of an effective site is its ____________________, which refers to the age of the information, how long it has been posted, and how often it is updated.

(Short Answer)
4.9/5
(32)

Please use the figure below to answer the following two questions. FIGURE 15-1 Please use the figure below to answer the following two questions. FIGURE 15-1    -Figure 15-1 shows a Google search with Sponsored Links. How do companies get their entries listed in the sponsored site area? -Figure 15-1 shows a Google search with Sponsored Links. How do companies get their entries listed in the sponsored site area?

(Multiple Choice)
4.9/5
(35)

A ____ site is a site that has paid the search engine a fee in exchange for being listed in the "Sponsored Sites" section on many of their pages.

(Multiple Choice)
4.9/5
(36)

Search engines are programs written to query and retrieve information stored in a database.

(True/False)
4.9/5
(38)

Processes and business methods may be protected by ____, which guarantee the inventor exclusive copyright to the process or method for a certain time period.

(Multiple Choice)
4.7/5
(37)

If the domain portion of a Web site is ____, the site is used for military branches.

(Multiple Choice)
4.8/5
(29)

Please use the figure below to answer the following two questions. FIGURE 15-1 Please use the figure below to answer the following two questions. FIGURE 15-1    -When looking at the Sponsored Links in Figure 15-1, the companies appear to be sharing ____. -When looking at the Sponsored Links in Figure 15-1, the companies appear to be sharing ____.

(Multiple Choice)
4.9/5
(36)

Software programs can be installed on a computer or network that automatically block access to user-specified sites or to sites with specified content.

(True/False)
4.9/5
(39)

Internet resources used in reports must be cited, which means giving credit to any information you include in a report that is not your original thought.

(True/False)
4.9/5
(40)

Please identify the letter of the choice that best matches the numbered definitions below. -Guarantees the inventor exclusive copyright to the process or method for a certain time period

(Multiple Choice)
4.8/5
(45)

____ are stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn.

(Multiple Choice)
4.8/5
(34)

The first page, or about page, of a Web site indicates how the site is organized and what options are available.

(True/False)
4.7/5
(47)

A(n) ____________________ is an attempt to deceive an audience into believing that something false is real.

(Short Answer)
4.9/5
(39)

Nancy has started her own flower delivery business. She has created a logo and a unique delivery process. Please answer the questions below. -To protect her unique delivery process from being used by other companies, Nancy would pursue obtaining a ____.

(Multiple Choice)
4.9/5
(39)

Sponsored sites provide balanced and impartial information.

(True/False)
4.8/5
(33)

Which of the following is NOT a feature of properly used links in a Web site?

(Multiple Choice)
4.7/5
(31)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)