The following are practice questions reviewing the information in the tutorial, similar to the questions that will be on the Information Resources test.
Use the BCC field in an email to send a message to multiple recipients, so that all recipients can view the list of everyone that received the message.True / False
Clients can connect to servers through various networks, from various devices (including from itself), and using various applications.True / False
HTML is used to translate between domain names and IP addresses, because it is easier to remember a name like www.google.com than it is to remember 188.8.131.52.True / False
It is impossible to pin down the exact size of the Internet because of its high growth rate and because
This isn't exactly a question, as much as a practice item. On the actual Information Resources test, you will need to download an attachment that we send to you, edit it, and send it back to us. You may want to add the email address firstname.lastname@example.org to your trusted senders list or whitelist if you have one.
Create a document in Word or another favorite program and email it to yourself. Go to a different computer and once you receive it, save it somewhere that you will remember where you put it. Don't just open the file; you have to actually save it to your computer to be able to reattach it later. Edit the file and resave it, then send it back to yourself. If you are using something other than Aggiemail to receive and send the attachment, you may need to check the junk mail box, since the message from us could get filtered there.
Common problems on this item include sending back to us the unedited file, sending us an attachment that belongs to someone else, opening the file directly from the email instead of saving it to your desktop or another easy to find location, and overzealous spam blockers that filter out our message. If you have your Aggiemail forwarded to an off-campus addresses, you may want to turn that forwarding off temporarily while taking the test.
When you receive spam messages, following the unsubscribe instructions at the bottom of the message will eventually reduce the amount of unwanted email you receive, although it will take some time.True / False
When submitting information to a website that uses encryption to protect your data, you can trust that they will not use your personal information for nefarious purposes.True / False
Cached web pages load faster, because they are have already been downloaded, so a request does not have to be sent to the web server.True / False
When searching the library catalog or in a search engine, if you enter the phrase "pineapple plantation" (including the quotes), resources that contain which of the following phrases will be included in the search results?
Levitt, Steven D. and Stephen J. Dubner. Freakonomics : a rogue economist explores the hidden side of everything. New York : William Morrow (2005).
The following citation is for a:
King, Benjamin. "Y. Botched Bowl Ticket Sales." Deseret Morning News (5 Dec 2006): A10.
Given a citation for a journal article, searching for the article title in the Library Catalog will help you find a copy of the article.True / False
Decipher the following citation and answer the question below:
Klein, Alan (2008). Globalizing sport: assessing the World Baseball Classic. Soccer and Society 9(2) pp 158-169.
To locate a copy of this item, you would need to search:
- If you do not remember the URL of a site you need to visit, it is generally quicker and safer to use a search engine rather than try to guess the address of the site.
- A firewall protects your computer against becoming infected by viruses and trojans.
- Be skeptical about anything you read on the Internet, unless it is from a person or organization that you know and trust (and even then, be careful).
- Different search engines like Google, Yahoo!, Ask, and others find information in various ways, so it is important to get to know their strengths and weaknesses to help you find the best results.
- gives you a USU IP address so you can access the article databases if you are off campus
- lets you hide your identity when you visit other websites
- requires that you set up a USU email address to use it
- cost 25 cents per hour during peak times of the day, 10 cents per hour during off-peak times, and is free at night when there are few other users