SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A quick and effective to communicate with other users
Social Network
RSS Feed
Push-Pull
spam
2. A program used to prevent viruses from getting on computers
FTP
antivirus
DNS (Domain Name System)
Search Engine
3. An example would be collaborative online tools. i.e. wikis - blogs
digital signature
antivirus
Web 2.0
ISP
4. Allows you to detect of a message has been tampered with during transit
Features of Browsers
Content Management Systems
Advertising
digital signature
5. Sent information that is unwanted
Database
Web Databases
spam
Firewall
6. An information hub
Database
cache
Features of Websites
DNS (Domain Name System)
7. When you are constantly receiving and reviewing media
Practical Techniques
adware
Web 2.0
Streaming Audio/Video
8. The basis for all of the other protocols
upload
Cookies
TCP/ IP
WWW
9. The amount of data that can be transmitted over a network in a given amount of time.
E-mail
Web 2.0
proxy server
Bandwidth
10. Prevents unwanted users from accessing your information
Practical Technique
Firewall
encryption
Social Networking
11. Someone who accesses information without consent
virus
W3C
hacker
IP Address
12. When you receive data
Email
Features of Browsers
digital signature
download
13. Messing with the sites DNS so any login information is sent to the new site
digital signature
pharming
HTTP
Practical Techniques
14. The foundation for communication for the internet
Browser
HTTP
Cookies
WWW
15. Files are compacted to reduce size
phishing
Features of Websites
compression
Browser
16. An example would be pop ups - banners
proxy server
Social Network
Bandwidth
Advertising
17. A mediator of requests between users and the resource
Search Engine
proxy server
decompression
Streaming Audio/Video
18. Attempting to steal personal information by posing as a business
HTTPS
TCP/ IP
Internet Protocols
phishing
19. World Wide Web
upload
WWW
Search Engine
virus
20. Hyperlinks
FTP
hacker
Features of Websites
encryption
21. A program that sends browsing information back to the originating website
cache
Cookies
HTTPS
WWW
22. Examples- Moodle - Blackboard
Content Management Systems
E-mail
WWW
Advertising
23. An assigned series of numbers - separated by periods - that designates an address on the internet.
phishing
HTTP
Practical Technique
IP Address
24. The World Wide Web Consortium organization is in charge of the World Wide Web standards
Web Databases
HTTPS
TCP/ IP
W3C
25. The language used in the creation of web pages
spyware
RSS Feed
upload
HTML
26. Tool to communicate with other users - i.e. Facebook
ISP
Features of Websites
Firewall
Social Networking
27. Translates the domain name into an IP address
Web Databases
hacker
DNS (Domain Name System)
WWW
28. Files are recovered from compressed form
Practical Techniques
decompression
IP Address
Web Databases
29. ______ technologies - example would be email news letters
Advertising
digital signature
Push-Pull
upload
30. Collaborative tools
antivirus
Internet Protocols
W3C
Practical Technique
31. Keeps the site up and running
FTP
Site Management
IP Address
decompression
32. Software that plays - displays - or downloads advertisements to the users computer
digital signature
adware
Browser
Cookies
33. Stores data for the future
Advertising
Web 2.0
cache
E-mail
34. Affects computers and replicates itself
Push-Pull
TCP/ IP
virus
Web Databases
35. When you send data
Database
Search Engine
Practical Technique
upload
36. Electronic mail
adware
ISP
Advertising
Email
37. An example would be an online encyclopedias
FTP
Web Databases
RSS Feed
ISP
38. Internet tool
Site Management
Features of Websites
Search Engine
Web 2.0
39. HTTP - HTTPS - FTP - TCP
Internet Protocols
virus
encryption
Features of Browsers
40. Collects information without users knowledge
Features of Browsers
digital signature
spyware
cache
41. Public and private passwords
download
public and private keys
HTTP
virus
42. Collaborative online tools
spam
Practical Techniques
Web 2.0
FTP
43. Electronic Mail
decompression
digital signature
E-mail
hacker
44. Allows access to the internet
hacker
Practical Techniques
Browser
compression
45. Bookmarks
Browser
pharming
Practical Techniques
Features of Browsers
46. Internet Service Provider
phishing
HTML
Social Networking
ISP
47. A secure version of HTTP
HTTPS
compression
IP Address
virus
48. The process of making text unreadable to anyone who doesn't have a key
Push-Pull
encryption
Database
W3C
49. A summary of web content changes
Firewall
RSS Feed
cache
spyware
50. Used for transferring files
FTP
Push-Pull
adware
DNS (Domain Name System)