Information Technologies Midterm Practice 2 (ch 5, 4 & 7)
which research practice will help ensure that highly reliable;e information is obtained?
assess the sites authoritativeness question the information never rely on a single source
what search technique will help avoid over constraining?
begin with an inclusive search and add more words one at a time.
identify a method used to find authoritative information
choose information from respected organizations
a search engine consists partly of a
crawler and a query processor
the 5 levels of styling information starting from the "farthest away" are
default, external, global, range, site
the NATO broadcast alphabet
encodes letters as words
a letter with an accent mark is displayed using the
escape symbol
if quotes surround the search phrase, "human powered flight", the search would find pages associated with the
exact phrase human powered flight
a search engine using the logical operator OR requires
one of the words to be found on the page
which of following would be used to display an ampersand on a webpage?
&
how many digits are in the hexadecimal system?
16
how many bits does each hex digit require?
4
the Hawaiian alphabet has 18 symbols. How many bits are needed to represent just these symbols?
5
the binary number for 101 represents the decimal number is
5
the XHTML tag for bold text is
<b></b>
the preferred way to specify a break that continues the text on the next line in a web page is
<br />
which of the following will display the rocket.jpg file on the page of the image is stored in the same folder as the page
<img src= "rocket.jpg" alt= "Rocket"/>
the tags used to specify table headings/columns headings are
<th> and </th>
what does ASCII stand for?
American standard code for information interchange
a good analogy of the memory in the computer is
a sidewalk with a single rock present or absent in each square.
one example of descriptive text is anchor text, which is
highlighted link text, specified inside <a...> tags, describing the page to which it links
in a web search, a match to a query is known as a(n)
hit
the PandA system
is binary
what is an effective technique in using the hit list?
skim top-level information and decide which links to explore further.
a weakness of Wikipedia is that
the content is not validated by experts
the title that appears on the title bar of the browser is specified using
title tags
the digital versatile disc (DVD)
uses bumps to encode the information
extended ASCII code:
was adopted by IBM as the standard for character representation, was developed in the US, is known as ISO-8859-1.
computer experts call spaces that have been inserted for readability
white space