Web 3.0 proposes a Web where both people and ideas are connected with each other and where personal Web assistants, called ____, can make decisions and take actions based on a user's preferences and past behaviors.
A. mashups
B. agents
C. APIs
D. portals
Answer: B
You might also like to view...
When the user presses Enter in a JPasswordField, the GUI component generates an , which is processed by an object that implements the interface .
a. ActionEvent, ActionListener. b. ActionEvent, ActionEventListener. c. TextEvent, TextListener. d. TextEvent, TextEventListener.
Once a _____ is installed, the attacker can gain full access to the computer.
A. ?botnet B. zombie C. ?worm D. ?rootkit
Which of the following statements is true?
a. The binary search algorithm is less efficient than the linear search, but it requires that the array be sorted. b. The binary search algorithm is more efficient than the linear search, but it requires that the array be unsorted. c. The binary search algorithm is more efficient than the linear search, but it requires that the array be sorted. d. The binary search algorithm is less efficient than the linear search, but it requires that the array be unsorted.
The Manchester encoding schemes solve the synchronization problem but are relatively inefficient because they have a baud rate that is ____ the bps.?
A. ?equal to B. ?twice C. ?three times D. ?four times