SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Internet
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When you receive data
adware
download
decompression
Cookies
2. Hyperlinks
DNS (Domain Name System)
Features of Websites
WWW
HTML
3. Files are recovered from compressed form
decompression
DNS (Domain Name System)
Bandwidth
pharming
4. Files are compacted to reduce size
download
Firewall
compression
spam
5. Affects computers and replicates itself
HTTPS
virus
download
DNS (Domain Name System)
6. Stores data for the future
Features of Browsers
cache
TCP/ IP
phishing
7. A secure version of HTTP
Search Engine
E-mail
Site Management
HTTPS
8. A quick and effective to communicate with other users
Database
Push-Pull
Bandwidth
Social Network
9. Tool to communicate with other users - i.e. Facebook
Web Databases
proxy server
Social Networking
Firewall
10. Examples- Moodle - Blackboard
hacker
HTML
Content Management Systems
decompression
11. A program used to prevent viruses from getting on computers
Practical Techniques
compression
antivirus
W3C
12. Allows you to detect of a message has been tampered with during transit
digital signature
IP Address
public and private keys
Search Engine
13. The language used in the creation of web pages
Social Networking
HTML
Practical Technique
upload
14. An assigned series of numbers - separated by periods - that designates an address on the internet.
hacker
IP Address
spam
download
15. The foundation for communication for the internet
Practical Technique
encryption
HTTP
decompression
16. Translates the domain name into an IP address
Push-Pull
FTP
cache
DNS (Domain Name System)
17. The World Wide Web Consortium organization is in charge of the World Wide Web standards
Features of Websites
TCP/ IP
W3C
proxy server
18. Sent information that is unwanted
virus
Push-Pull
Database
spam
19. Electronic mail
HTTP
Email
Cookies
Web Databases
20. Someone who accesses information without consent
Web 2.0
phishing
hacker
Features of Websites
21. Public and private passwords
download
public and private keys
HTTP
Social Network
22. Collects information without users knowledge
spyware
HTTP
Features of Websites
Practical Technique
23. Internet tool
HTML
Internet Protocols
Search Engine
digital signature
24. A summary of web content changes
phishing
RSS Feed
W3C
upload
25. Prevents unwanted users from accessing your information
Firewall
phishing
DNS (Domain Name System)
digital signature
26. HTTP - HTTPS - FTP - TCP
Internet Protocols
Email
TCP/ IP
WWW
27. Messing with the sites DNS so any login information is sent to the new site
Search Engine
Bandwidth
pharming
compression
28. When you send data
upload
Streaming Audio/Video
IP Address
antivirus
29. The process of making text unreadable to anyone who doesn't have a key
download
cache
encryption
Streaming Audio/Video
30. When you are constantly receiving and reviewing media
virus
Streaming Audio/Video
E-mail
Advertising
31. An example would be collaborative online tools. i.e. wikis - blogs
E-mail
Web 2.0
Cookies
HTTPS
32. The basis for all of the other protocols
ISP
Push-Pull
TCP/ IP
encryption
33. Allows access to the internet
hacker
spyware
cache
Browser
34. Bookmarks
Features of Browsers
FTP
IP Address
W3C
35. Electronic Mail
HTTPS
Features of Browsers
E-mail
Advertising
36. World Wide Web
antivirus
Email
Practical Techniques
WWW
37. ______ technologies - example would be email news letters
Bandwidth
Push-Pull
upload
proxy server
38. Keeps the site up and running
Site Management
HTTPS
pharming
Social Network
39. An example would be pop ups - banners
Push-Pull
Advertising
Internet Protocols
Cookies
40. An information hub
pharming
public and private keys
Database
Site Management
41. A mediator of requests between users and the resource
Site Management
HTTP
Browser
proxy server
42. Collaborative tools
spam
adware
Web Databases
Practical Technique
43. Used for transferring files
download
FTP
Web 2.0
public and private keys
44. An example would be an online encyclopedias
Web Databases
Streaming Audio/Video
spyware
Search Engine
45. Collaborative online tools
proxy server
digital signature
Practical Techniques
phishing
46. Software that plays - displays - or downloads advertisements to the users computer
HTML
Push-Pull
spam
adware
47. Internet Service Provider
hacker
ISP
pharming
FTP
48. The amount of data that can be transmitted over a network in a given amount of time.
Bandwidth
spyware
Email
Push-Pull
49. Attempting to steal personal information by posing as a business
W3C
decompression
TCP/ IP
phishing
50. A program that sends browsing information back to the originating website
RSS Feed
decompression
Cookies
TCP/ IP