Web 3.0 proposes a Web where both people and ideas are connected with each other and where personal Web assistants, called ____, can make decisions and take actions based on a user's preferences and past behaviors.

A. mashups
B. agents
C. APIs
D. portals


Answer: B

Computer Science & Information Technology

You might also like to view...

When the user presses Enter in a JPasswordField, the GUI component generates an , which is processed by an object that implements the interface .

a. ActionEvent, ActionListener. b. ActionEvent, ActionEventListener. c. TextEvent, TextListener. d. TextEvent, TextEventListener.

Computer Science & Information Technology

Once a _____ is installed, the attacker can gain full access to the computer.

A. ?botnet B. zombie C. ?worm  D. ?rootkit

Computer Science & Information Technology

Which of the following statements is true?

a. The binary search algorithm is less efficient than the linear search, but it requires that the array be sorted. b. The binary search algorithm is more efficient than the linear search, but it requires that the array be unsorted. c. The binary search algorithm is more efficient than the linear search, but it requires that the array be sorted. d. The binary search algorithm is less efficient than the linear search, but it requires that the array be unsorted.

Computer Science & Information Technology

The Manchester encoding schemes solve the synchronization problem but are relatively inefficient because they have a baud rate that is ____ the bps.?

A. ?equal to B. ?twice C. ?three times D. ?four times

Computer Science & Information Technology