1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
15

A major difference between digital librarians and traditional librarians is that traditional librarians rarely work with people.

Instead, they man a computer terminal all day. A) True B) False
Computers and Technology
2 answers:
Veseljchak [2.6K]3 years ago
6 0

Answer: false

Explanation:

Traditional libraries manage their holdings using catalogs that contain information about every object they own. Metadata, characterized in Chapter 1 as “data about data,” is a recently coined term for this information. Metadata is information in a structured format and its purpose is to provide a description of other data objects in order to facilitate access to them. The data objects themselves (e.g., the books) generally contain unstructured information. Sometimes, as in the Humanity

Ivahew [28]3 years ago
5 0

Answer:

(B) False

Explanation:

Traditional librarians are in charge of storage and preservation of physical items, particularly books and periodicals. cataloging at a high level rather than one of detail

You might be interested in
Was the type writer the first part of the keyboard? ​
hoa [83]

Answer:

no because of the fact that there were clickers

Explanation:

the key board came out after the clicker

8 0
3 years ago
Why can’t web apps send notifications to a device’s taskbar when the app is closed?
tangare [24]
Web apps can't send notifications when it's closed because it is not installed into the device as a software program, meaning it doesn't have enough access to do so. Plus you are closing it down so how is something that you close down supposed to work?
8 0
4 years ago
Given the IPv4 address in CIDR notation 215.200.110.50/25, identify the subnet ID that this address belongs to.
stich3 [128]
215.200.110.00, 215.100.110.64, 215.200.110.128,215.100.110.192
7 0
2 years ago
Read the following scenario. How might Sarah correct successfully complete her task?
nexus9112 [7]

Answer:

Explanation:

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

or

b: empty the recycle bin : You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

4 0
3 years ago
Describe at least two ways social media has impacted cybersecurity.
dybincka [34]

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

7 0
3 years ago
Other questions:
  • This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
    11·1 answer
  • Taylor has spent a lot of time developing and setting up his presentation. He wants to make sure his delivery is as good as poss
    8·2 answers
  • In risk management what does risk evaluation involved
    14·1 answer
  • List the memory units inside and outside of the CPU, along with short descriptions of their
    11·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Where Go to set up margins on a letter
    15·1 answer
  • How did the new technologies of WWI affect soldiers fighting on the front lines? Please include at least three examples of new t
    5·1 answer
  • Any anime weebs wanna talk
    7·2 answers
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!