SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bookmarks
HTML
decompression
Features of Browsers
IP Address
2. The World Wide Web Consortium organization is in charge of the World Wide Web standards
Cookies
W3C
pharming
public and private keys
3. Allows you to detect of a message has been tampered with during transit
Site Management
HTML
spam
digital signature
4. Messing with the sites DNS so any login information is sent to the new site
Social Network
W3C
Content Management Systems
pharming
5. Collects information without users knowledge
HTTPS
WWW
proxy server
spyware
6. A quick and effective to communicate with other users
spyware
virus
Practical Techniques
Social Network
7. A program used to prevent viruses from getting on computers
Email
pharming
public and private keys
antivirus
8. Affects computers and replicates itself
spyware
proxy server
virus
hacker
9. Translates the domain name into an IP address
TCP/ IP
antivirus
Advertising
DNS (Domain Name System)
10. When you receive data
Search Engine
Web Databases
download
Social Network
11. When you are constantly receiving and reviewing media
Features of Browsers
Push-Pull
phishing
Streaming Audio/Video
12. HTTP - HTTPS - FTP - TCP
IP Address
Internet Protocols
cache
adware
13. The process of making text unreadable to anyone who doesn't have a key
decompression
Push-Pull
Practical Technique
encryption
14. The amount of data that can be transmitted over a network in a given amount of time.
Streaming Audio/Video
Social Network
RSS Feed
Bandwidth
15. Collaborative online tools
Practical Techniques
Web 2.0
compression
proxy server
16. An example would be pop ups - banners
Push-Pull
IP Address
TCP/ IP
Advertising
17. The foundation for communication for the internet
FTP
Content Management Systems
Internet Protocols
HTTP
18. A mediator of requests between users and the resource
Social Network
proxy server
phishing
E-mail
19. Tool to communicate with other users - i.e. Facebook
spam
Features of Browsers
compression
Social Networking
20. Internet tool
WWW
pharming
Web Databases
Search Engine
21. Someone who accesses information without consent
virus
hacker
Database
Advertising
22. Public and private passwords
Web Databases
public and private keys
Advertising
TCP/ IP
23. An example would be collaborative online tools. i.e. wikis - blogs
Web 2.0
digital signature
Firewall
W3C
24. An information hub
proxy server
phishing
Database
RSS Feed
25. Stores data for the future
cache
Browser
Content Management Systems
HTTPS
26. When you send data
hacker
upload
Streaming Audio/Video
Firewall
27. Internet Service Provider
WWW
Push-Pull
ISP
hacker
28. Files are compacted to reduce size
IP Address
Practical Technique
Push-Pull
compression
29. Hyperlinks
Content Management Systems
antivirus
Features of Websites
Firewall
30. Collaborative tools
Practical Technique
phishing
HTTP
pharming
31. A program that sends browsing information back to the originating website
decompression
Social Network
Cookies
cache
32. Software that plays - displays - or downloads advertisements to the users computer
Internet Protocols
HTTPS
Practical Technique
adware
33. Used for transferring files
Browser
DNS (Domain Name System)
FTP
Practical Techniques
34. Examples- Moodle - Blackboard
TCP/ IP
Features of Websites
Social Networking
Content Management Systems
35. World Wide Web
Advertising
encryption
WWW
Cookies
36. Keeps the site up and running
W3C
Browser
Practical Techniques
Site Management
37. A summary of web content changes
Features of Browsers
hacker
Practical Techniques
RSS Feed
38. Sent information that is unwanted
digital signature
spam
download
cache
39. Electronic Mail
pharming
Bandwidth
DNS (Domain Name System)
E-mail
40. ______ technologies - example would be email news letters
Push-Pull
antivirus
HTTP
E-mail
41. Allows access to the internet
adware
spyware
proxy server
Browser
42. A secure version of HTTP
HTTPS
Web Databases
Practical Techniques
Features of Websites
43. An assigned series of numbers - separated by periods - that designates an address on the internet.
phishing
E-mail
IP Address
antivirus
44. Prevents unwanted users from accessing your information
IP Address
TCP/ IP
Firewall
Features of Browsers
45. Electronic mail
HTTPS
Email
Browser
Social Network
46. The language used in the creation of web pages
HTML
Search Engine
Browser
cache
47. An example would be an online encyclopedias
W3C
Web Databases
E-mail
antivirus
48. The basis for all of the other protocols
TCP/ IP
phishing
decompression
Social Network
49. Attempting to steal personal information by posing as a business
digital signature
phishing
Streaming Audio/Video
HTTPS
50. Files are recovered from compressed form
hacker
decompression
Search Engine
WWW