SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internet Service Provider
Features of Websites
hacker
ISP
Email
2. Messing with the sites DNS so any login information is sent to the new site
encryption
Search Engine
pharming
Practical Technique
3. A program used to prevent viruses from getting on computers
phishing
antivirus
Content Management Systems
IP Address
4. A program that sends browsing information back to the originating website
Cookies
proxy server
compression
Features of Websites
5. Internet tool
proxy server
digital signature
Search Engine
Cookies
6. Sent information that is unwanted
Web Databases
decompression
spam
W3C
7. Software that plays - displays - or downloads advertisements to the users computer
adware
WWW
Social Network
Email
8. A mediator of requests between users and the resource
proxy server
cache
Browser
encryption
9. The amount of data that can be transmitted over a network in a given amount of time.
Push-Pull
ISP
Bandwidth
IP Address
10. Prevents unwanted users from accessing your information
digital signature
Firewall
Advertising
E-mail
11. Someone who accesses information without consent
Cookies
Practical Technique
hacker
pharming
12. A summary of web content changes
decompression
W3C
Cookies
RSS Feed
13. An example would be an online encyclopedias
spyware
Web Databases
adware
spam
14. When you are constantly receiving and reviewing media
public and private keys
Streaming Audio/Video
Social Network
HTTPS
15. An assigned series of numbers - separated by periods - that designates an address on the internet.
decompression
Push-Pull
Social Networking
IP Address
16. An example would be pop ups - banners
TCP/ IP
Advertising
compression
Features of Browsers
17. A quick and effective to communicate with other users
Social Network
HTTPS
pharming
spam
18. The process of making text unreadable to anyone who doesn't have a key
encryption
E-mail
WWW
Site Management
19. Hyperlinks
Cookies
Search Engine
decompression
Features of Websites
20. Examples- Moodle - Blackboard
Content Management Systems
E-mail
hacker
Features of Websites
21. Collaborative online tools
Internet Protocols
Practical Techniques
Push-Pull
Firewall
22. Files are compacted to reduce size
compression
digital signature
phishing
HTTPS
23. World Wide Web
Bandwidth
E-mail
HTTPS
WWW
24. Tool to communicate with other users - i.e. Facebook
TCP/ IP
Internet Protocols
Social Networking
Bandwidth
25. HTTP - HTTPS - FTP - TCP
Internet Protocols
Search Engine
Bandwidth
Web 2.0
26. Used for transferring files
FTP
download
W3C
decompression
27. Translates the domain name into an IP address
spyware
Web 2.0
Content Management Systems
DNS (Domain Name System)
28. Collects information without users knowledge
pharming
spam
spyware
adware
29. Keeps the site up and running
Search Engine
IP Address
Site Management
Practical Technique
30. Affects computers and replicates itself
virus
Search Engine
antivirus
Push-Pull
31. The basis for all of the other protocols
Features of Browsers
TCP/ IP
phishing
Advertising
32. An information hub
Browser
W3C
IP Address
Database
33. Electronic mail
Email
upload
digital signature
proxy server
34. Files are recovered from compressed form
decompression
Content Management Systems
Web 2.0
encryption
35. ______ technologies - example would be email news letters
Practical Technique
pharming
Push-Pull
HTTP
36. The foundation for communication for the internet
WWW
spyware
Database
HTTP
37. Collaborative tools
Practical Technique
RSS Feed
WWW
adware
38. The language used in the creation of web pages
decompression
HTML
phishing
Social Network
39. Bookmarks
spyware
Features of Browsers
Web Databases
WWW
40. When you send data
spyware
upload
virus
cache
41. When you receive data
Web Databases
W3C
download
proxy server
42. Electronic Mail
Practical Techniques
E-mail
Social Network
cache
43. Stores data for the future
cache
public and private keys
Features of Browsers
RSS Feed
44. A secure version of HTTP
WWW
download
proxy server
HTTPS
45. The World Wide Web Consortium organization is in charge of the World Wide Web standards
W3C
spyware
Practical Technique
compression
46. An example would be collaborative online tools. i.e. wikis - blogs
virus
Advertising
Practical Technique
Web 2.0
47. Public and private passwords
public and private keys
Features of Browsers
Advertising
Content Management Systems
48. Allows access to the internet
download
WWW
upload
Browser
49. Allows you to detect of a message has been tampered with during transit
Database
Web 2.0
digital signature
Social Network
50. Attempting to steal personal information by posing as a business
HTTP
FTP
HTTPS
phishing