Social media for library services Proven 19

Welcome to your Social media for library services

1. 
Web 2.0 is a term used to describe major technological shifts or improvements in the Web.

2. 
Which social media site helped launch Susan Boyle’s career?

3. 
Most extensively used service on the internet

4. 
Blogs play an important curatorial role in social media because some popular blogs are followed by people seeking the best and most interesting ideas.

5. 
Larry Page and Sergei Brin are the founder of Google search engine.

6. 
Drupal the content management system doesn’t has module to support library services.

7. 
A lurker on discussion boards and Web forums is a person who posts irrelevant or inflammatory messages.

8. 
Blogs or weblogs are

9. 
Facebook is the most popular tool in library community for instant messaging, creating user database, posting, sharing information, news updates, blogging, etc.

10. 
Unwanted e-mailsare known as _______.

11. 
Automated mailing list that allows for easy subscription, subscription cancellation, and sending of e-mails to subscribers on the list are called

12. 
The social media tools are categorized into 6 types by__________

13. 
VuFind, LibraryFind, BlackLight are the popular ________

14. 
Drupal, WordPress and Joomla are the most popular

15. 
Which was the first social network launched on the web in 1994?

16. 
Skype helps us to _________?

17. 
The content organization or arrangement in social media considers the information or keyword captured through an activity such as

18. 
“Searching” is the online activity which ranks number one.

19. 
By definition the social media is

20. 
Cryptography is used to ensure data integrity

21. 
Information security can be achieved by

22. 
Deterrent Controls are intended to discourage potential attackers and send the message that it is better not to attack

23. 
One of the components of internet is Router

24. 
Internet E-mail ID is always unique

25. 
One of the attacks against information availability is known as

26. 
Log takes care of high level actions while audit takes care of low level action

27. 
One of the key aspects of information security

28. 
Information is represented in the following form

29. 
First step in the access of information from a server is

30. 

Scroll to Top