Sunday, May 23, 2010
Saturday, May 22, 2010
Exam Questions
MALIT 216: Information Networks and Resource Sharing
May 21, 2010
Instructions:
1. No permit No exam.
2. Number pages appropriately.
3. Begin your answer on a new page.
4. This exam is good for the whole period and must be submitted at the end of the period.
A. Answer all questions in this Section.
1. Each of you were tasked to search for journal articles on ‘information networks’ and ‘resource sharing,’ from your readings of these journal articles (a) differentiate/compare and contrast what Networking is from Resource Sharing (b) Give three advantages for networking in the library. [10 points]
2. The primary role of librarians in our society has been to provide their clients with physical access to information resources that they use to satisfy information needs. Historically, this role has been accomplished almost exclusively by libraries through development of on-site, print collection of information resources. Discuss how libraries, librarians and the community they serve are affected by this technology. [10 points]
B. Choose questions that would constitute 20 points from this Section.
1. Briefly discuss the justifications of Open Access as mentioned by Herb Ulrich. [10 points]
2. (a) What are the common criteria used for evaluating Internet resources? Explain briefly these criteria. (b) What are the strengths and weaknesses of internet resources? [10 points]
3. Web 2.0 is becoming a trend in managing information systems in web-based communities like the library and information centers. (a) Define Library 2.0. (b) Describe with 3 examples, how Library 2.0 technologies’ features can be applied in a library service environment. Example, ‘synchronous or asynchronous messaging like chat with a librarian’ and how can you apply this to the library service. [10 points]
4. Draw a diagram showing how a ‘spider’ crawl the Web pages. [5 points]
5. Internet security involves the protection of a computer’s Internet account and files from intrusion of an unknown user. However, there are some apparently useful programs that may contain features with hidden malicious intent. Such programs are known as malware, viruses, Trojans, worms, spyware. Define these five programs. [5 points]
6. Give a comprehensive definition (a) Open Source Software and (b) Proprietary Software and briefly describe a software related to it. [5 points]
7. Define Spam and Phishing Scam. How are they different from each? [5 points]
Thank you.
Cheryl T. Roldan, MLIS
Note: Final exam will contribute 40% to your final grade.
May 21, 2010
Instructions:
1. No permit No exam.
2. Number pages appropriately.
3. Begin your answer on a new page.
4. This exam is good for the whole period and must be submitted at the end of the period.
A. Answer all questions in this Section.
1. Each of you were tasked to search for journal articles on ‘information networks’ and ‘resource sharing,’ from your readings of these journal articles (a) differentiate/compare and contrast what Networking is from Resource Sharing (b) Give three advantages for networking in the library. [10 points]
2. The primary role of librarians in our society has been to provide their clients with physical access to information resources that they use to satisfy information needs. Historically, this role has been accomplished almost exclusively by libraries through development of on-site, print collection of information resources. Discuss how libraries, librarians and the community they serve are affected by this technology. [10 points]
B. Choose questions that would constitute 20 points from this Section.
1. Briefly discuss the justifications of Open Access as mentioned by Herb Ulrich. [10 points]
2. (a) What are the common criteria used for evaluating Internet resources? Explain briefly these criteria. (b) What are the strengths and weaknesses of internet resources? [10 points]
3. Web 2.0 is becoming a trend in managing information systems in web-based communities like the library and information centers. (a) Define Library 2.0. (b) Describe with 3 examples, how Library 2.0 technologies’ features can be applied in a library service environment. Example, ‘synchronous or asynchronous messaging like chat with a librarian’ and how can you apply this to the library service. [10 points]
4. Draw a diagram showing how a ‘spider’ crawl the Web pages. [5 points]
5. Internet security involves the protection of a computer’s Internet account and files from intrusion of an unknown user. However, there are some apparently useful programs that may contain features with hidden malicious intent. Such programs are known as malware, viruses, Trojans, worms, spyware. Define these five programs. [5 points]
6. Give a comprehensive definition (a) Open Source Software and (b) Proprietary Software and briefly describe a software related to it. [5 points]
7. Define Spam and Phishing Scam. How are they different from each? [5 points]
Thank you.
Cheryl T. Roldan, MLIS
Note: Final exam will contribute 40% to your final grade.
Subscribe to:
Comments (Atom)