SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Files are recovered from compressed form
decompression
spam
phishing
W3C
2. A quick and effective to communicate with other users
phishing
Firewall
Social Network
E-mail
3. Stores data for the future
ISP
Database
cache
Web 2.0
4. Examples- Moodle - Blackboard
Practical Technique
decompression
Content Management Systems
Email
5. A mediator of requests between users and the resource
download
Bandwidth
Advertising
proxy server
6. The foundation for communication for the internet
HTTP
spam
ISP
hacker
7. World Wide Web
WWW
Bandwidth
spam
download
8. A secure version of HTTP
Web Databases
HTTPS
Social Network
cache
9. Translates the domain name into an IP address
compression
Browser
DNS (Domain Name System)
Email
10. Attempting to steal personal information by posing as a business
phishing
Practical Technique
HTTP
Social Network
11. When you send data
Streaming Audio/Video
upload
Social Network
pharming
12. Electronic mail
Features of Browsers
spam
Email
Practical Technique
13. Electronic Mail
Web 2.0
Practical Technique
virus
E-mail
14. Tool to communicate with other users - i.e. Facebook
Social Networking
spam
E-mail
FTP
15. An information hub
Database
Browser
IP Address
Streaming Audio/Video
16. Files are compacted to reduce size
Social Network
compression
HTTP
hacker
17. The amount of data that can be transmitted over a network in a given amount of time.
Bandwidth
Web Databases
Site Management
proxy server
18. Used for transferring files
FTP
Web 2.0
ISP
public and private keys
19. Allows access to the internet
Advertising
E-mail
Social Network
Browser
20. Affects computers and replicates itself
hacker
spyware
proxy server
virus
21. Collaborative tools
TCP/ IP
Practical Technique
Social Networking
public and private keys
22. The basis for all of the other protocols
spam
Internet Protocols
Bandwidth
TCP/ IP
23. Keeps the site up and running
Site Management
decompression
Advertising
upload
24. Public and private passwords
decompression
E-mail
public and private keys
Database
25. HTTP - HTTPS - FTP - TCP
virus
Cookies
Internet Protocols
Web Databases
26. Collaborative online tools
Practical Techniques
proxy server
phishing
Site Management
27. An example would be collaborative online tools. i.e. wikis - blogs
ISP
compression
digital signature
Web 2.0
28. The process of making text unreadable to anyone who doesn't have a key
FTP
Social Networking
upload
encryption
29. An assigned series of numbers - separated by periods - that designates an address on the internet.
spyware
HTTPS
IP Address
Push-Pull
30. Software that plays - displays - or downloads advertisements to the users computer
FTP
Content Management Systems
upload
adware
31. Bookmarks
Email
Features of Browsers
Web Databases
download
32. Sent information that is unwanted
Database
spam
pharming
Firewall
33. An example would be pop ups - banners
Browser
upload
Advertising
IP Address
34. When you receive data
Push-Pull
E-mail
Browser
download
35. Prevents unwanted users from accessing your information
Firewall
spam
Search Engine
HTML
36. Internet Service Provider
Features of Browsers
ISP
hacker
WWW
37. A program that sends browsing information back to the originating website
hacker
Social Networking
Cookies
digital signature
38. Collects information without users knowledge
spyware
Browser
Practical Technique
decompression
39. Internet tool
encryption
HTTP
Search Engine
WWW
40. A summary of web content changes
public and private keys
phishing
RSS Feed
Social Network
41. ______ technologies - example would be email news letters
Push-Pull
Practical Technique
virus
spyware
42. Someone who accesses information without consent
upload
Practical Technique
phishing
hacker
43. When you are constantly receiving and reviewing media
IP Address
Streaming Audio/Video
HTTPS
ISP
44. An example would be an online encyclopedias
phishing
Web Databases
Practical Techniques
cache
45. The language used in the creation of web pages
E-mail
virus
HTML
Firewall
46. Allows you to detect of a message has been tampered with during transit
Browser
Search Engine
upload
digital signature
47. A program used to prevent viruses from getting on computers
upload
compression
antivirus
Cookies
48. Messing with the sites DNS so any login information is sent to the new site
Social Networking
pharming
Practical Techniques
FTP
49. The World Wide Web Consortium organization is in charge of the World Wide Web standards
Internet Protocols
W3C
Database
TCP/ IP
50. Hyperlinks
hacker
Features of Websites
proxy server
Social Networking