Structured directory index
Keyword index
Full-text index
Static index/site map
Spyware
Trojan
Illicit server
Malware
Rate this question:
MIME
HTTP
TCP/IP
FTP
Rate this question:
Scramble text using mathematical algorithm
Scramble text using benign viruses
Remove all formatting and punctuation from the text
Compress the text so that only abbreviated portions of words remain
Rate this question:
Purchase domain names that are similar to their actual domain names
Host their Web sites on ilicit servers
Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys
Automatically apply operating system updates and patches as they become available
Rate this question:
Authoritative peer-reviewd
Open peer-reviewed
Primary
Individual
Yahoo
Excite
WebCrawler
Rate this question:
Use all the space in your browser cache
Cause an error page to display
Activate the robot or spider program
Return less relevant results for your keywords
Rate this question:
Filter span at the server.
Translate dotted-quad IP addresses into easily recognise text-based names, and vice versa.
Filter spam at the client.
Schedule appointments and meetings, store contact information and manage tasks.
A worm is capable of replicating itself automatically while affecting data.
A worm and a virus synonymous terms for a malicious program designed to damage computer systems.
A worm does not replicate itself, it assumes control of system operations
A worm does not replicate itself; it damages or destroys data.
Rate this question:
An encryption method in which two seperate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which the same key is used to encrypt and decrypt a message
An encryption method in which a key is required to encrypt data from storage and to verify its integrity
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
Rate this question:
An encryption method in which a key is required to encrypt data for storage and verify its integrity
An encryption method in which the same key is used to encrypt and decrypt a message
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages.
Rate this question:
RSA encryption
Asymmetric-key encryption
Hash encryption
Symmetric-key encryption
Rate this question:
Digital signature
Encrypted key
Digital certificate
Firewall
Rate this question:
It requires the search results to include multiple keywords
It requires the search results to include one keyword or the other or both
It requires the search results to include one keyword and exclude another
It requires the search results to include one keyword or one URL.
Rate this question:
Containing the content that appear on each Web page
Linking the Web site to other related Web pages
Providing search engines with a descriptive of the Web site
Preventing early-version browsers from viewing the Web site
Install the latest version of a browser, or install any available upgrades.
Compress the files, then decompress them before you attempt to open them.
Open the files in the Windows operating system only.
Open the files in an operating system other than Windows.
Personal Digital Assistant (PDA).
Message Transfer Agent (MTA).
Personal Information Management (PIM) program.
Mail User Agent (MUA).
The more frequently you specified keywords are found in a particular document, the higher the relevancy score that document receives.
The more reference sources included in a Web document, the higher the relevancy score that document receives.
The more hyperlinks included in a Web document, the higher the relevancy score that document receives
The more keywords you specify in your search criteria, the higher the relevancy scores assigned to the retrieved documents.
DOC, EXE and HTM
DOC, TXT, and PDF
PNG, GIF and JPG
BMP, JPG and TIFF
Consult secondary resources.
Consult open peer-reviewed resources
Consult authoritative peer-reviewed resources
Consult popular resources
Static index/site map
Boolean index
Full-text index
Keyword index
Rate this question:
Smartphones use infrared-based keyboards for inputting information into PIM applications.
Smartphones rarely have enough memory to support full-featured PIM applications.
Smartphones PIM applications are designed to work in tandem with traditional desktop or laptop computers.
Smartphones save changes you make in PIM applications in random-access memory (RAM), the content of which are erased when you turn the smartphone off.
An information portal allows only keyword index searches.
An information portal will only index Web sites based on manual submissions.
An information portal allows only static index/site map searches.
An information portal uses a robot or spider program to browse the Web and index the content that it finds.
Rate this question:
Quiz Review Timeline (Updated): May 12, 2013 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Get To Know Internet Quiz!
The Internet has taken the world by storm. It has changed the way we communicate. Do you think you know everything there is to know about the internet? Take the online quiz with...
Questions:
28 |
Attempts:
504 |
Last updated:
Apr 03, 2025
|
The Internet Quiz: Basic Facts!
The Internet Quiz: Basic Facts! Explore true\/false questions about the internet's size, ownership, history, purpose, and management. Enhance your understanding of the internet's...
Questions:
8 |
Attempts:
699 |
Last updated:
Apr 14, 2025
|
Introduction To Internet MCQ Quiz
Do you use the internet every day? How much do you really know about it? Wanna play this introduction to the internet MCQ quiz that we have brought for you? The Internet has...
Questions:
20 |
Attempts:
4079 |
Last updated:
Mar 14, 2024
|
Tpr2_u3: The Internet 1/3
How much do you know about information and communications technology? Communication is made easier today, thanks to the internet's introduction, where people get over...
Questions:
15 |
Attempts:
2400 |
Last updated:
Mar 12, 2025
|
Let's Have Some Google Time. Play This Google Quiz!
Google is an American technology company which was created by two men two decades ago. This company has created various applications which have made internet usage easy for...
Questions:
10 |
Attempts:
543 |
Last updated:
Mar 21, 2023
|
How Much Do You Know About Tencent QQ?
Tencent QQ is an instant messaging software service that provides various functions for it's a very wide range of users. Functions that include social media gaming,...
Questions:
10 |
Attempts:
167 |
Last updated:
Mar 22, 2023
|
Wait!
Here's an interesting quiz for you.