SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A mediator of requests between users and the resource
TCP/ IP
virus
proxy server
public and private keys
2. Hyperlinks
download
decompression
Site Management
Features of Websites
3. When you send data
spam
Web Databases
upload
public and private keys
4. Internet tool
Email
Search Engine
virus
public and private keys
5. Translates the domain name into an IP address
Streaming Audio/Video
DNS (Domain Name System)
Features of Browsers
compression
6. A program used to prevent viruses from getting on computers
antivirus
Web 2.0
cache
Firewall
7. A program that sends browsing information back to the originating website
decompression
hacker
RSS Feed
Cookies
8. Files are recovered from compressed form
decompression
Web 2.0
Firewall
Bandwidth
9. Bookmarks
Advertising
Practical Techniques
Social Network
Features of Browsers
10. Allows access to the internet
decompression
Features of Websites
digital signature
Browser
11. Used for transferring files
HTTP
FTP
virus
E-mail
12. The basis for all of the other protocols
Practical Techniques
adware
HTTP
TCP/ IP
13. Stores data for the future
Features of Websites
Practical Techniques
cache
IP Address
14. The foundation for communication for the internet
HTTP
encryption
Bandwidth
Features of Websites
15. HTTP - HTTPS - FTP - TCP
upload
TCP/ IP
Internet Protocols
encryption
16. ______ technologies - example would be email news letters
Internet Protocols
Push-Pull
adware
Streaming Audio/Video
17. Prevents unwanted users from accessing your information
Firewall
TCP/ IP
FTP
spam
18. Tool to communicate with other users - i.e. Facebook
Streaming Audio/Video
Social Networking
Advertising
cache
19. Attempting to steal personal information by posing as a business
cache
TCP/ IP
phishing
proxy server
20. Software that plays - displays - or downloads advertisements to the users computer
Cookies
decompression
Site Management
adware
21. Files are compacted to reduce size
Browser
Features of Websites
compression
adware
22. Public and private passwords
public and private keys
Cookies
compression
Firewall
23. Electronic mail
Social Network
hacker
Email
ISP
24. A summary of web content changes
Web Databases
virus
ISP
RSS Feed
25. Someone who accesses information without consent
Practical Techniques
hacker
RSS Feed
FTP
26. Collaborative online tools
public and private keys
W3C
compression
Practical Techniques
27. When you receive data
phishing
Site Management
Web 2.0
download
28. Electronic Mail
antivirus
E-mail
Features of Websites
HTTPS
29. Messing with the sites DNS so any login information is sent to the new site
Browser
Social Networking
Social Network
pharming
30. Affects computers and replicates itself
Streaming Audio/Video
download
virus
Features of Browsers
31. World Wide Web
WWW
phishing
Streaming Audio/Video
HTTPS
32. A secure version of HTTP
virus
compression
HTTPS
FTP
33. The amount of data that can be transmitted over a network in a given amount of time.
hacker
Database
Search Engine
Bandwidth
34. The World Wide Web Consortium organization is in charge of the World Wide Web standards
Web 2.0
Social Networking
phishing
W3C
35. The language used in the creation of web pages
Firewall
WWW
HTML
decompression
36. Allows you to detect of a message has been tampered with during transit
E-mail
FTP
RSS Feed
digital signature
37. An example would be an online encyclopedias
Web Databases
Search Engine
HTTPS
antivirus
38. Collaborative tools
Content Management Systems
Practical Technique
digital signature
Search Engine
39. Keeps the site up and running
public and private keys
Email
proxy server
Site Management
40. An assigned series of numbers - separated by periods - that designates an address on the internet.
Practical Techniques
public and private keys
compression
IP Address
41. Collects information without users knowledge
Streaming Audio/Video
cache
spyware
adware
42. The process of making text unreadable to anyone who doesn't have a key
Social Network
encryption
Internet Protocols
download
43. An example would be pop ups - banners
Advertising
proxy server
Search Engine
compression
44. An example would be collaborative online tools. i.e. wikis - blogs
Push-Pull
ISP
Web 2.0
RSS Feed
45. A quick and effective to communicate with other users
download
Content Management Systems
Social Network
Social Networking
46. Examples- Moodle - Blackboard
digital signature
Social Network
Database
Content Management Systems
47. Sent information that is unwanted
spam
FTP
HTTPS
virus
48. When you are constantly receiving and reviewing media
Streaming Audio/Video
virus
W3C
IP Address
49. An information hub
Internet Protocols
W3C
Database
TCP/ IP
50. Internet Service Provider
E-mail
ISP
compression
encryption