SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Collects information without users knowledge
spyware
Practical Technique
download
encryption
2. A mediator of requests between users and the resource
digital signature
proxy server
spyware
Web 2.0
3. Allows you to detect of a message has been tampered with during transit
phishing
virus
antivirus
digital signature
4. Allows access to the internet
cache
Web 2.0
antivirus
Browser
5. Electronic mail
download
HTML
virus
Email
6. Sent information that is unwanted
spam
virus
Browser
Cookies
7. A secure version of HTTP
spyware
HTTP
download
HTTPS
8. Prevents unwanted users from accessing your information
phishing
proxy server
WWW
Firewall
9. Files are recovered from compressed form
Practical Technique
Internet Protocols
antivirus
decompression
10. When you receive data
W3C
Firewall
Content Management Systems
download
11. Files are compacted to reduce size
compression
phishing
W3C
public and private keys
12. Hyperlinks
Features of Websites
Bandwidth
FTP
upload
13. An example would be collaborative online tools. i.e. wikis - blogs
RSS Feed
FTP
pharming
Web 2.0
14. An example would be an online encyclopedias
cache
HTTP
Web Databases
Features of Browsers
15. Translates the domain name into an IP address
DNS (Domain Name System)
Advertising
Bandwidth
public and private keys
16. Bookmarks
Firewall
DNS (Domain Name System)
Features of Browsers
IP Address
17. ______ technologies - example would be email news letters
Cookies
Push-Pull
compression
HTTPS
18. Stores data for the future
HTTPS
cache
Database
Content Management Systems
19. Collaborative online tools
FTP
spam
Content Management Systems
Practical Techniques
20. Electronic Mail
proxy server
E-mail
TCP/ IP
Database
21. The World Wide Web Consortium organization is in charge of the World Wide Web standards
W3C
pharming
Email
phishing
22. HTTP - HTTPS - FTP - TCP
decompression
Internet Protocols
public and private keys
Features of Websites
23. Used for transferring files
download
FTP
hacker
Search Engine
24. The foundation for communication for the internet
W3C
HTTP
IP Address
Practical Technique
25. A summary of web content changes
Web Databases
upload
decompression
RSS Feed
26. The language used in the creation of web pages
Social Network
HTML
HTTP
public and private keys
27. Messing with the sites DNS so any login information is sent to the new site
proxy server
pharming
FTP
spam
28. Attempting to steal personal information by posing as a business
Firewall
compression
Web Databases
phishing
29. Tool to communicate with other users - i.e. Facebook
FTP
Social Networking
cache
TCP/ IP
30. A quick and effective to communicate with other users
Social Network
virus
Social Networking
Internet Protocols
31. An example would be pop ups - banners
HTTPS
Database
Advertising
TCP/ IP
32. The basis for all of the other protocols
Bandwidth
TCP/ IP
encryption
ISP
33. The amount of data that can be transmitted over a network in a given amount of time.
phishing
Bandwidth
Internet Protocols
Practical Technique
34. An information hub
Database
spam
Social Network
Advertising
35. Internet Service Provider
Practical Techniques
Web Databases
Social Network
ISP
36. A program used to prevent viruses from getting on computers
Database
compression
digital signature
antivirus
37. When you are constantly receiving and reviewing media
Streaming Audio/Video
spyware
Features of Browsers
Firewall
38. Collaborative tools
Practical Technique
upload
phishing
Social Network
39. A program that sends browsing information back to the originating website
Features of Websites
Cookies
HTTPS
antivirus
40. Software that plays - displays - or downloads advertisements to the users computer
adware
Practical Technique
Social Networking
Database
41. The process of making text unreadable to anyone who doesn't have a key
Advertising
adware
Database
encryption
42. Internet tool
hacker
WWW
Search Engine
pharming
43. Someone who accesses information without consent
download
Site Management
TCP/ IP
hacker
44. World Wide Web
phishing
HTTP
WWW
download
45. Keeps the site up and running
Site Management
spam
Internet Protocols
Streaming Audio/Video
46. Examples- Moodle - Blackboard
Social Network
Content Management Systems
WWW
Firewall
47. Public and private passwords
HTTPS
phishing
public and private keys
adware
48. An assigned series of numbers - separated by periods - that designates an address on the internet.
antivirus
adware
IP Address
HTTPS
49. Affects computers and replicates itself
virus
FTP
Practical Techniques
proxy server
50. When you send data
Email
upload
digital signature
public and private keys