Chapter 27 Quiz: Lateral Reading and Advanced Web Literacy
Instructions: Answer all questions. For multiple choice, select the best answer. For short answer, write 1-3 complete sentences. Answers are hidden in collapsible sections below each question.
Question 1 What distinguishes "lateral reading" from "vertical reading" in the context of online source evaluation?
A) Lateral reading involves reading multiple paragraphs at the same time; vertical reading reads top to bottom B) Lateral reading searches for information about a source in new tabs; vertical reading reads within the source deeply C) Lateral reading uses mobile devices; vertical reading uses desktop computers D) Lateral reading focuses on images; vertical reading focuses on text
Show Answer
**Answer: B** Lateral reading, as defined by the Stanford History Education Group, involves leaving the original page and opening new tabs to search for what independent sources say *about* the site. Vertical reading is the intuitive but less effective strategy of reading the source's own content carefully to assess its credibility from the inside.Question 2 In the Stanford Web Credibility research conducted by Wineburg and McGrew, which group most effectively evaluated online sources?
A) Stanford undergraduate students with high GPAs B) Professional historians with PhDs C) Professional fact-checkers from news organizations D) Graduate students majoring in information science
Show Answer
**Answer: C** Professional fact-checkers dramatically outperformed both historians and students at evaluating online sources. The key advantage was not domain knowledge but strategy: fact-checkers used lateral reading while historians and students used vertical reading.Question 3 What does the "S" in the SIFT method stand for, and what cognitive purpose does it serve?
Show Answer
**Answer:** The "S" stands for **Stop**. Its cognitive purpose is to interrupt the automatic, emotionally driven processing (System 1 thinking) that makes misinformation effective. By pausing before engaging with content, the reader can ask: "Do I have sufficient context to evaluate this source?" It counteracts the affect heuristic, which causes emotionally resonant content to feel more credible.Question 4 You want to search only the CDC website for information about childhood vaccination schedules updated after 2022. Which Google search query correctly uses advanced operators?
A) cdc.gov childhood vaccination schedule 2022
B) site:cdc.gov "childhood vaccination" after:2022-01-01
C) inurl:cdc.gov vaccination schedule recent
D) intitle:cdc vaccination children 2022
Show Answer
**Answer: B** The `site:` operator restricts search results to a specific domain. The `after:` date operator restricts results to those published after the specified date. Option A is a regular search without operators. Option C would find pages with "cdc.gov" in the URL, which could include any site that links to or mentions CDC. Option D would find pages with "cdc" in the title, not restricted to the CDC website.Question 5 Which of the following is NOT a function of the InVID/WeVerify browser extension?
A) Extracting keyframes from a video for reverse image searching B) Reading embedded metadata from video files C) Generating AI-based deepfake detection scores D) Magnifying specific regions of a video frame to examine details
Show Answer
**Answer: C** InVID/WeVerify supports keyframe extraction, metadata extraction, magnification for detail examination, and platform-specific search functions. While deepfake detection tools exist, they are separate from InVID/WeVerify's primary feature set, which focuses on provenance and contextual verification.Question 6 In reverse image searching, what is the most important chronological finding to look for?
A) The most recent use of the image B) The most widely shared occurrence of the image C) The highest-resolution version of the image D) The earliest documented occurrence of the image
Show Answer
**Answer: D** Finding the *earliest* documented occurrence of an image is most important because it establishes original context. If a photograph claimed to be from 2024 appears in search results from 2019 with a different caption, the current claim is almost certainly false. TinEye is particularly useful because it can sort results by "Oldest" to find the first recorded occurrence.Question 7 You encounter a social media account with 85,000 followers that consistently posts political content 40 times per day but receives an average of only 3 likes and 1 comment per post. What does this pattern most likely suggest?
Show Answer
**Answer:** This pattern strongly suggests the followers are largely **purchased bots** rather than genuine engaged followers. Authentic accounts with 85,000 followers typically see engagement rates (likes + comments) of at least 1-5% per post, which would mean hundreds to thousands of engagements. The combination of high follower count, very high posting frequency, and very low engagement is a classic indicator of either bought followers or a coordinated inauthentic account. The 40 posts per day is also far above typical human posting behavior, suggesting possible automation.Question 8 WHOIS data showing that a news website's domain was registered 12 days ago is:
A) Definitive proof the website is publishing misinformation B) Irrelevant, since registration date has no relationship to credibility C) A signal worth noting that increases scrutiny, but not proof of deception D) Proof the website is run by a foreign government
Show Answer
**Answer: C** A very recent registration date is a meaningful red flag that warrants increased scrutiny, but it is not proof of anything by itself. New legitimate websites are created daily. However, the combination of very recent registration plus absence from media rating tools plus no established presence in news archives is collectively much more suspicious. Domain age is one signal among many, not a standalone verdict.Question 9 The Wayback Machine (web.archive.org) is useful for domain verification because it allows researchers to:
A) Block access to websites spreading misinformation B) See the historical content and development of a website over time C) Determine who funded the creation of a website D) Track individual users who visited a website
Show Answer
**Answer: B** The Internet Archive's Wayback Machine stores historical snapshots of websites. Researchers use it to verify whether a site that currently claims to be a news organization has always had that purpose, to detect recent content pivots (a gardening blog repurposed as a news site), and to verify claimed founding dates. It cannot identify funders or track users, and it does not have blocking capabilities.Question 10 Which three historical figures are disproportionately affected by quote misattribution?
A) Abraham Lincoln, Albert Einstein, and Winston Churchill B) Thomas Jefferson, Mahatma Gandhi, and Mark Twain C) Benjamin Franklin, Confucius, and Frederick Douglass D) A is correct, and so are B and C
Show Answer
**Answer: D** All three groups are correct. Quote misattribution clusters around figures recognized as authoritative, wise, or eloquent, who lived before comprehensive audio-visual recording, and whose large textual corpora make any attribution seem plausible. Lincoln, Einstein, Churchill, Jefferson, Gandhi, Twain, Franklin, and Confucius are all well-documented victims of systematic misattribution. The most notorious trio in internet-era misattribution studies are Lincoln, Einstein, and Churchill.Question 11
The filetype:pdf search operator in Google is most useful for fact-checking because:
A) PDFs are always more accurate than web pages B) PDFs often represent primary documents, reports, and official publications that haven't been reformatted C) PDFs cannot be created by misinformation sites D) Google indexes PDFs more accurately than HTML pages
Show Answer
**Answer: B** The `filetype:pdf` operator is useful for finding primary documents — government reports, academic studies, official policy documents, and similar materials — that are published in PDF format and may be harder to find through regular web searches dominated by news articles about those documents. PDFs from legitimate official sources (.gov, .edu, major research institutions) can often be found more directly this way. However, PDFs are not inherently more accurate, and misinformation sites do produce PDF documents.Question 12 Shadow analysis in geolocation involves:
A) Looking for hidden text in an image that has been obscured by image editing B) Using the direction and length of shadows to estimate the time of day and season when an image was taken C) Analyzing the dark portions of an image to detect manipulation D) Comparing an image's color saturation to identify post-processing
Show Answer
**Answer: B** Shadow analysis uses the geometry of visible shadows — specifically their direction relative to north and their length relative to the shadow-casting object's height — to constrain the solar elevation angle. Combined with a known or estimated location, this determines the approximate time of day and time of year when the photograph was taken. Tools like SunCalc.org compute solar angles for any location and time.Question 13 What is typosquatting, and why is it relevant to fact-checking?
Show Answer
**Answer:** Typosquatting is the practice of registering domain names that differ from legitimate websites by small typographical variations — for example, "ABCnews.com.co" instead of "ABCnews.com," or "nytirnes.com" (using "rn" to mimic "m") instead of "nytimes.com." It is relevant to fact-checking because typosquatted domains are used to deceive readers into thinking they are visiting legitimate news outlets. A source that appears to be from a trusted organization may actually be from an impersonator domain, and the content may be fabricated. Checking the exact domain name (not just the outlet name) is a critical step in source verification.Question 14 Google Fact Check Explorer is best described as:
A) A tool Google uses to automatically remove misinformation from search results B) A search engine for published fact-check findings from credentialed fact-checking organizations C) An AI system that analyzes claims and determines their truth value D) A database of scientific studies used to verify health claims
Show Answer
**Answer: B** Google Fact Check Explorer aggregates fact-check findings from credentialed third-party fact-checking organizations that use the ClaimReview markup schema. Users can search for a claim or URL and see what fact-checkers have found. It is a search tool for *existing fact checks*, not an automated fact-checking system. Google does not determine the truth of claims — that is done by the independent fact-checking organizations whose work the tool indexes.Question 15 When Yandex Images is recommended alongside Google Images for reverse image search, what specific advantage does Yandex offer?
A) Yandex searches more current social media content than Google B) Yandex provides legally admissible documentation of image origins C) Yandex often finds matches that Google misses, particularly for faces and Eastern European content D) Yandex removes copyright-protected images that Google would flag
Show Answer
**Answer: C** Yandex's visual similarity and facial recognition algorithms are different from Google's and often identify matches that Google's algorithms miss. This is particularly notable for: photographs of people (Yandex's face matching is often more powerful), images originating from Russian-language, Eastern European, or Central Asian contexts, and older or lower-resolution images. Professional fact-checkers routinely use Yandex as a complement to Google rather than a replacement.Question 16 The "Find Better Coverage" step in SIFT is based on what epistemological principle?
Show Answer
**Answer:** The "Find Better Coverage" step is based on the principle that **independent corroboration** is a stronger form of evidence than reliance on a single source. The credibility of a claim is not solely a property of the source reporting it, but also of the broader epistemic ecosystem around it. A claim reported by multiple independent organizations with different editorial interests and methodologies is much stronger than the same claim appearing only on a single source. This reflects the third-person versus first-person evidence distinction: independent sources provide third-party verification that the originating source cannot provide for itself.Question 17 Which statement best describes the Media Bias/Fact Check (MBFC) and Ad Fontes Media tools?
A) They provide authoritative, objective ratings of news outlet credibility B) They are useful signals about outlet-level tendencies but have their own methodological limitations that should be acknowledged C) They should only be used by professional journalists, not students D) They assess individual articles rather than outlets as a whole
Show Answer
**Answer: B** MBFC and Ad Fontes Media are useful tools but should be understood as imperfect instruments with their own potential biases in how they categorize outlets. Both have been criticized for specific ratings. They assess entire outlets based on aggregate judgments about editorial practices, which may not reflect the quality of any individual article. They are best used as one signal in a broader lateral reading investigation rather than as authoritative verdicts. Students should understand the methodology behind each tool.Question 18 A photograph shows a city skyline with snow on the ground and bare deciduous trees. The shadow of a nearby building falls to the northeast at a very short length. What is wrong with these observations together?
A) Nothing is wrong; these observations are mutually consistent B) Short shadows indicate noon in summer, but snow and bare trees suggest winter — these are contradictory C) Northeast shadows are impossible in any location D) Deciduous trees can be bare in summer due to drought
Show Answer
**Answer: B** In the Northern Hemisphere, very short shadows at solar noon indicate high solar elevation — characteristic of summer months when the sun is high in the sky. However, snow on the ground and bare deciduous trees are characteristic of winter. These two observations are inconsistent with each other and with any single date, suggesting the image may have been manipulated by combining elements from different photographs taken at different times, or one of the supposed "clues" is not what it appears to be. This kind of inconsistency is a valuable signal in geolocation and chronolocation work.Question 19 Quote Investigator's methodology for finding the earliest occurrence of a quotation primarily relies on:
A) Interviews with scholars who study the attributed speaker B) Crowdsourcing from Wikipedia editors C) Searching newspaper archives, book databases, and historical records for the earliest print occurrence D) Applying natural language processing to identify semantic similarity
Show Answer
**Answer: C** Garson O'Toole (Quote Investigator) conducts historical research in newspaper archives (such as newspapers.com and ProQuest historical newspapers), Google Books, HathiTrust, and other primary document databases to trace quotations to their earliest verifiable print occurrence. This historical bibliographic method can establish when a quote first appeared in print and under what attribution, revealing how misattribution developed over time.Question 20 What makes emotional resonance a particularly effective vector for misinformation, and how does the SIFT method address this?
Show Answer
**Answer:** Emotional resonance activates System 1 (fast, automatic, heuristic) thinking, which processes information for pattern matching and emotional congruence rather than systematic evaluation. Content that elicits strong emotions — fear, outrage, disgust, or enthusiasm — is processed as more credible and is more likely to be shared without verification. Misinformation producers deliberately craft emotionally charged content to exploit this mechanism. SIFT addresses this with the "Stop" move, which explicitly interrupts the automatic processing cycle by inserting a metacognitive pause. By asking "Do I have enough context to evaluate this?" before engaging emotionally, the reader activates more deliberate (System 2) evaluation. The remaining three moves (Investigate, Find, Trace) provide systematic alternatives to emotional credibility assessment.Question 21 The "ClaimReview" schema is significant for web-based fact-checking because:
A) It prevents misinformation websites from being indexed by Google B) It allows fact-checkers to mark up their findings so they appear as structured data in search engine results C) It is a legal standard that courts use to determine defamation D) It enables automatic removal of false claims from social media platforms
Show Answer
**Answer: B** ClaimReview is a structured data standard (developed by Schema.org) that fact-checking organizations embed in their HTML to communicate their findings in machine-readable form to search engines. When a user searches for a claim that has been fact-checked by an organization using ClaimReview, the fact-check verdict can appear directly in search results as a rich snippet — reducing friction between a reader and relevant fact-check findings. It does not prevent indexing, is not a legal standard, and does not authorize removal of content.Question 22 Which combination of account signals would most strongly suggest a social media account is part of a coordinated inauthentic influence operation?
A) High follower count, diverse topic range, irregular posting times, established account history B) Low follower count, single-topic focus, very recent creation, synchronized posting with other accounts sharing identical content C) Verified badge, confirmed real identity, high engagement rate, diverse geographic follower base D) Older account, frequent corrections and retractions, mixed political content
Show Answer
**Answer: B** The combination of very recent creation (during or just before a major news event), exclusive focus on a single political topic, low organic follower base, and synchronized activity — posting the same content at the same time as other accounts — is the strongest set of signals for coordinated inauthentic behavior. Established accounts with diverse content and genuine engagement are typically organic. Verified status provides some identity confirmation but does not preclude coordinated behavior. Corrections and retractions actually signal accountability rather than inauthenticity.Question 23 The "upgrade effect" in quote misattribution refers to:
A) The process by which internet search engines rank misattributed quotes higher than accurate ones B) The tendency for quotes to be attributed upward to more famous or authoritative figures than the actual speaker C) The way social media platforms amplify content with famous names in the headline D) The improvement in quote accuracy that happens when professional fact-checkers review them
Show Answer
**Answer: B** The "upgrade effect," described by Quote Investigator researcher Garson O'Toole, is the pattern by which a sentiment originally expressed by a lesser-known figure gets progressively attributed to more famous and authoritative figures over time. A quote from an anonymous eighteenth-century clergyman becomes attributed to a founding father; an insight from a minor business writer becomes attributed to Einstein. The upgrade increases the quote's persuasive authority. This is why certain exceptionally famous and authoritative figures — Lincoln, Einstein, Churchill — accumulate enormous numbers of misattributed quotes.Question 24 Describe two limitations of reverse image search as a verification tool, and explain how professional fact-checkers compensate for these limitations.
Show Answer
**Answer:** Two key limitations of reverse image search are: 1. **Coverage gaps**: No single reverse image search engine indexes the entire internet. Google, TinEye, and Yandex each maintain different databases with different coverage, particularly across languages, regions, and time periods. An image may have an earlier occurrence in archives not indexed by any of the three tools. 2. **Manipulation evasion**: Simple image modifications — color adjustments, horizontal flipping, addition of text overlays, cropping, or minor pixel changes — can make a manipulated image less likely to be recognized as a copy by reverse search algorithms. Professional fact-checkers compensate by: (a) using all three major tools rather than relying on one, recognizing that each catches what others miss; (b) using InVID/WeVerify to extract keyframes from video and search individual frames; (c) searching for the *subject* of the image (people, places, events) using text search when visual search fails; and (d) using the Google Images "Tools" filter to search for the image by time period, often finding an original context even when the exact image isn't indexed.Question 25 (Short Essay) Explain why professional fact-checkers are better at evaluating online sources than subject-matter experts (like historians or scientists), even when the fact-checker has less domain knowledge than the expert. What does this finding tell us about how web literacy should be taught?