SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Keeps the site up and running
antivirus
hacker
Site Management
Search Engine
2. Allows access to the internet
Browser
Features of Browsers
decompression
Advertising
3. Files are recovered from compressed form
public and private keys
decompression
proxy server
download
4. World Wide Web
spyware
encryption
WWW
hacker
5. When you receive data
Streaming Audio/Video
download
decompression
Cookies
6. Collects information without users knowledge
Practical Techniques
Internet Protocols
spyware
Social Networking
7. The foundation for communication for the internet
Push-Pull
spyware
HTTP
hacker
8. The World Wide Web Consortium organization is in charge of the World Wide Web standards
HTTPS
Cookies
Web Databases
W3C
9. Electronic mail
Email
hacker
spam
digital signature
10. A program used to prevent viruses from getting on computers
pharming
Search Engine
antivirus
WWW
11. Sent information that is unwanted
Firewall
W3C
spam
Internet Protocols
12. Allows you to detect of a message has been tampered with during transit
digital signature
encryption
Push-Pull
HTML
13. The language used in the creation of web pages
Advertising
HTML
ISP
public and private keys
14. Hyperlinks
compression
Social Network
Features of Websites
proxy server
15. ______ technologies - example would be email news letters
decompression
Push-Pull
Practical Technique
Streaming Audio/Video
16. Collaborative online tools
Practical Techniques
adware
Social Network
Cookies
17. Messing with the sites DNS so any login information is sent to the new site
HTTP
Content Management Systems
DNS (Domain Name System)
pharming
18. Stores data for the future
cache
W3C
Practical Techniques
phishing
19. A summary of web content changes
upload
download
RSS Feed
Social Network
20. When you send data
pharming
HTTP
upload
Practical Techniques
21. Someone who accesses information without consent
hacker
HTML
Web Databases
download
22. An example would be collaborative online tools. i.e. wikis - blogs
Web 2.0
Internet Protocols
Content Management Systems
antivirus
23. Translates the domain name into an IP address
Firewall
proxy server
upload
DNS (Domain Name System)
24. A program that sends browsing information back to the originating website
Cookies
Database
Practical Technique
DNS (Domain Name System)
25. An information hub
virus
Database
decompression
Practical Techniques
26. An example would be pop ups - banners
TCP/ IP
cache
HTTPS
Advertising
27. Used for transferring files
phishing
Features of Browsers
FTP
Social Networking
28. Public and private passwords
virus
Social Network
public and private keys
DNS (Domain Name System)
29. A quick and effective to communicate with other users
Social Network
Browser
Push-Pull
virus
30. Files are compacted to reduce size
Push-Pull
virus
Content Management Systems
compression
31. The amount of data that can be transmitted over a network in a given amount of time.
DNS (Domain Name System)
Bandwidth
download
digital signature
32. Prevents unwanted users from accessing your information
download
W3C
Firewall
TCP/ IP
33. Internet tool
Search Engine
HTTPS
spam
Site Management
34. Software that plays - displays - or downloads advertisements to the users computer
HTTPS
decompression
ISP
adware
35. Electronic Mail
Firewall
E-mail
HTML
encryption
36. An example would be an online encyclopedias
decompression
Web Databases
Cookies
pharming
37. Bookmarks
Features of Browsers
FTP
compression
Browser
38. Attempting to steal personal information by posing as a business
phishing
HTTP
cache
compression
39. Tool to communicate with other users - i.e. Facebook
IP Address
ISP
Social Networking
Advertising
40. The basis for all of the other protocols
DNS (Domain Name System)
Internet Protocols
TCP/ IP
Features of Websites
41. Affects computers and replicates itself
digital signature
Web 2.0
virus
Streaming Audio/Video
42. Examples- Moodle - Blackboard
spam
Content Management Systems
Web Databases
Push-Pull
43. Internet Service Provider
Bandwidth
decompression
Social Networking
ISP
44. Collaborative tools
HTML
Streaming Audio/Video
HTTPS
Practical Technique
45. HTTP - HTTPS - FTP - TCP
HTTP
spyware
Internet Protocols
Content Management Systems
46. An assigned series of numbers - separated by periods - that designates an address on the internet.
Practical Techniques
IP Address
Email
HTTP
47. The process of making text unreadable to anyone who doesn't have a key
digital signature
Social Network
Database
encryption
48. When you are constantly receiving and reviewing media
digital signature
Streaming Audio/Video
WWW
Push-Pull
49. A secure version of HTTP
proxy server
Email
HTTPS
Firewall
50. A mediator of requests between users and the resource
ISP
W3C
Firewall
proxy server