Welcome to your Social media for library services
1. Web 2.0 is a term used to describe major technological shifts or improvements in the Web.
2. Which social media site helped launch Susan Boyle’s career?
3. Most extensively used service on the internet
4. Blogs play an important curatorial role in social media because some popular blogs are followed by people seeking the best and most interesting ideas.
5. Larry Page and Sergei Brin are the founder of Google search engine.
6. Drupal the content management system doesn’t has module to support library services.
7. A lurker on discussion boards and Web forums is a person who posts irrelevant or inflammatory messages.
9. Facebook is the most popular tool in library community for instant messaging, creating user database, posting, sharing information, news updates, blogging, etc.
10. Unwanted e-mailsare known as _______.
11. Automated mailing list that allows for easy subscription, subscription cancellation, and sending of e-mails to subscribers on the list are called
12. The social media tools are categorized into 6 types by__________
13. VuFind, LibraryFind, BlackLight are the popular ________
14. Drupal, WordPress and Joomla are the most popular
15. Which was the first social network launched on the web in 1994?
16. Skype helps us to _________?
17. The content organization or arrangement in social media considers the information or keyword captured through an activity such as
18. “Searching” is the online activity which ranks number one.
19. By definition the social media is
20. Cryptography is used to ensure data integrity
21. Information security can be achieved by
22. Deterrent Controls are intended to discourage potential attackers and send the message that it is better not to attack
23. One of the components of internet is Router
24. Internet E-mail ID is always unique
25. One of the attacks against information availability is known as
26. Log takes care of high level actions while audit takes care of low level action
27. One of the key aspects of information security
28. Information is represented in the following form
29. First step in the access of information from a server is