SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Affects computers and replicates itself
virus
W3C
phishing
spyware
2. HTTP - HTTPS - FTP - TCP
W3C
HTML
Internet Protocols
FTP
3. Files are compacted to reduce size
HTTP
W3C
compression
public and private keys
4. Someone who accesses information without consent
FTP
phishing
hacker
Site Management
5. The process of making text unreadable to anyone who doesn't have a key
encryption
Firewall
Browser
Social Network
6. Allows you to detect of a message has been tampered with during transit
Firewall
Search Engine
Bandwidth
digital signature
7. Software that plays - displays - or downloads advertisements to the users computer
spam
digital signature
Social Network
adware
8. Bookmarks
decompression
adware
HTML
Features of Browsers
9. The amount of data that can be transmitted over a network in a given amount of time.
Features of Browsers
public and private keys
Bandwidth
download
10. When you receive data
compression
Cookies
Features of Browsers
download
11. An example would be an online encyclopedias
IP Address
Web Databases
Search Engine
digital signature
12. The foundation for communication for the internet
HTTP
download
HTML
virus
13. A program that sends browsing information back to the originating website
Web 2.0
Cookies
RSS Feed
Advertising
14. When you send data
E-mail
spyware
upload
Cookies
15. Internet Service Provider
Practical Techniques
ISP
Push-Pull
FTP
16. When you are constantly receiving and reviewing media
phishing
antivirus
proxy server
Streaming Audio/Video
17. Tool to communicate with other users - i.e. Facebook
Social Networking
decompression
HTTP
proxy server
18. Internet tool
Search Engine
decompression
download
DNS (Domain Name System)
19. Used for transferring files
RSS Feed
E-mail
FTP
Social Network
20. Files are recovered from compressed form
encryption
Web 2.0
phishing
decompression
21. A program used to prevent viruses from getting on computers
Web Databases
antivirus
W3C
Browser
22. Electronic mail
Firewall
Email
FTP
HTTP
23. An assigned series of numbers - separated by periods - that designates an address on the internet.
public and private keys
WWW
digital signature
IP Address
24. An example would be collaborative online tools. i.e. wikis - blogs
Web 2.0
Advertising
public and private keys
proxy server
25. An example would be pop ups - banners
ISP
IP Address
Advertising
Web 2.0
26. Collaborative tools
Practical Techniques
Database
Practical Technique
DNS (Domain Name System)
27. The language used in the creation of web pages
HTML
FTP
Push-Pull
adware
28. Messing with the sites DNS so any login information is sent to the new site
Internet Protocols
Web Databases
Content Management Systems
pharming
29. Allows access to the internet
adware
decompression
Browser
Email
30. The World Wide Web Consortium organization is in charge of the World Wide Web standards
W3C
Search Engine
public and private keys
Web Databases
31. The basis for all of the other protocols
hacker
spam
TCP/ IP
download
32. A quick and effective to communicate with other users
Social Network
compression
Streaming Audio/Video
W3C
33. Examples- Moodle - Blackboard
Content Management Systems
FTP
Social Network
Site Management
34. Attempting to steal personal information by posing as a business
phishing
decompression
WWW
Email
35. A mediator of requests between users and the resource
proxy server
Practical Technique
HTTP
Browser
36. An information hub
HTTPS
spyware
Search Engine
Database
37. Hyperlinks
hacker
Features of Websites
download
compression
38. Sent information that is unwanted
HTTP
Push-Pull
adware
spam
39. Public and private passwords
public and private keys
Practical Techniques
adware
Site Management
40. Keeps the site up and running
Site Management
ISP
digital signature
pharming
41. Electronic Mail
Internet Protocols
decompression
Practical Technique
E-mail
42. Collaborative online tools
Practical Techniques
Internet Protocols
upload
download
43. A secure version of HTTP
Content Management Systems
W3C
encryption
HTTPS
44. ______ technologies - example would be email news letters
download
Push-Pull
phishing
Web 2.0
45. Collects information without users knowledge
Web 2.0
spyware
encryption
phishing
46. Stores data for the future
Database
Browser
cache
Web 2.0
47. A summary of web content changes
Social Network
RSS Feed
Browser
DNS (Domain Name System)
48. World Wide Web
WWW
RSS Feed
Cookies
Practical Techniques
49. Prevents unwanted users from accessing your information
Email
spyware
decompression
Firewall
50. Translates the domain name into an IP address
DNS (Domain Name System)
antivirus
HTML
decompression