Do You Know About Computers?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6800 | Total Attempts: 9,511,835
| Attempts: 323 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. April Fools' Day 2009 saw concern on the internet around which new worm?

Explanation

In April Fools' Day 2009, there was widespread concern on the internet regarding the Conficker worm. This worm was a malicious software that targeted Microsoft Windows operating systems. It spread primarily through network vulnerabilities and infected millions of computers worldwide. The Conficker worm had the ability to disable security features, steal personal information, and create a botnet for further attacks. Its widespread presence and potential for damage caused significant concern and prompted increased security measures during that time.

Submit
Please wait...
About This Quiz
Do You Know About Computers? - Quiz

How well do you know about computers? Please play this quiz and prove yourself!

2. What type of cyber-attack involves attaching other activities to an innocent-seeming link?

Explanation

Clickjacking is a type of cyber-attack that involves attaching other activities to an innocent-seeming link. In clickjacking, the attacker tricks the user into clicking on a link or button that appears harmless but actually performs a different action, such as downloading malware or granting unauthorized access. This technique allows the attacker to deceive the user and carry out malicious activities without their knowledge or consent.

Submit
3. What is the name for the part of the wireless signal which synchronizes traffic?

Explanation

The correct answer is "Preamble". In wireless communication, the preamble is a part of the signal that is used to synchronize the transmission and reception of data. It contains a specific pattern of bits that allows the receiving device to detect the start of a transmission and establish the necessary timing and synchronization for proper data transfer. The preamble is essential for ensuring reliable and accurate communication between devices in a wireless network.

Submit
4. What term applies to a group of computers infected with code allowing external control?

Explanation

A botnet is a term used to describe a group of computers that have been infected with malicious code, allowing them to be controlled externally. This network of compromised computers can be used by cybercriminals to carry out various activities, such as launching coordinated attacks, distributing spam emails, or stealing sensitive information. The term "botnet" is derived from the words "robot" and "network," illustrating the automated nature of these infected machines working together under the control of a central command.

Submit
5. What designation is given to the part of the radio spectrum used for wireless networking?

Explanation

The designation given to the part of the radio spectrum used for wireless networking is the ISM Band. ISM stands for Industrial, Scientific, and Medical, and this band is reserved for non-licensed use. It allows for the transmission of signals for various purposes, including wireless networking, without the need for obtaining specific licenses. This band is commonly used for Wi-Fi communication, Bluetooth devices, and other wireless technologies.

Submit
6. What term refers to using a mouse to initiate a voice communication?

Explanation

Click To Call refers to using a mouse to initiate a voice communication. This term is commonly used in the context of online communication or customer service, where a user can click on a button or link on a website to directly initiate a phone call with a representative or contact. By clicking on the designated area, the user's call is instantly connected, allowing for immediate voice communication without the need for dialing or manually entering phone numbers.

Submit
7. A pair of one-way encryption keys, one public and one private, is termed what?

Explanation

The correct answer is "Asymmetric." This term refers to a pair of one-way encryption keys, one public and one private, that are used in asymmetric encryption algorithms. In this type of encryption, the public key is used to encrypt data, while the private key is used to decrypt it. The public key can be freely shared, allowing anyone to encrypt messages that only the holder of the private key can decrypt. This provides a secure means of communication and is commonly used in various cryptographic systems.

Submit
8. Used in VoIP, "SIP" is an abbreviation for which protocol?

Explanation

SIP stands for Session Initiation Protocol, which is a protocol used in VoIP (Voice over Internet Protocol) systems. It is responsible for initiating, modifying, and terminating communication sessions between two or more participants. It is widely used for voice and video calls, instant messaging, multimedia conferences, and other real-time communication applications.

Submit
9. A drop in VoIP quality when using many other programs on a PC can be attributed to what?

Explanation

A drop in VoIP quality when using many other programs on a PC can be attributed to Processor Drain. When a PC is running multiple programs simultaneously, it puts a heavy load on the processor, causing it to slow down and struggle to handle the tasks efficiently. This can result in a decrease in the performance of VoIP applications, leading to a drop in quality.

Submit
10. What general-purpose Internet encryption protocol, published in 1999, derived from SSL?

Explanation

TLS (Transport Layer Security) is the correct answer because it is a general-purpose Internet encryption protocol that was published in 1999. TLS is derived from SSL (Secure Sockets Layer), which was the predecessor to TLS. TLS is widely used to provide secure communication over the internet, ensuring that data transmitted between a client and a server is encrypted and protected from eavesdropping or tampering.

Submit
11. What general term is used to describe a program that reports on one computer to another?

Explanation

An agent is a general term used to describe a program that reports on one computer to another. Agents are typically used in network management systems to monitor and report on the status and performance of various devices and systems. They can collect data, send it to a central server, and perform various tasks based on the instructions received from the server. Agents are often used in remote monitoring and management scenarios, where they provide real-time information and enable administrators to take appropriate actions.

Submit
12. What does "PGP" stand for in an early home encryption tool?

Explanation

PGP stands for Pretty Good Privacy in an early home encryption tool. This encryption tool was developed in 1991 by Phil Zimmermann and was designed to provide secure communication and data encryption. PGP uses a combination of symmetric-key and public-key cryptography to ensure the privacy and integrity of data. It became widely popular as a means to protect sensitive information, such as emails, files, and documents, from unauthorized access and interception.

Submit
13. What term is used for PC software to emulate telephone functionality via VoIP?

Explanation

A softphone is a term used for PC software that emulates telephone functionality via VoIP (Voice over Internet Protocol). It allows users to make and receive phone calls over the internet using their computer instead of a traditional telephone. This software typically includes features such as call management, voicemail, and contact lists, providing a convenient and cost-effective solution for communication.

Submit
14. In 2008, Dan Kaminsky found a major flaw in what critical networking service?

Explanation

In 2008, Dan Kaminsky discovered a significant vulnerability in the DNS (Domain Name System) protocol. This flaw allowed attackers to exploit the way DNS resolves domain names into IP addresses, potentially leading to various malicious activities such as redirecting users to fake websites or intercepting sensitive information. The discovery of this flaw prompted a major effort to patch and secure DNS systems worldwide.

Submit
15. The revised USB 3.0 standard is expected to be up to how many times faster than USB 2.0?

Explanation

The revised USB 3.0 standard is expected to be up to 10 times faster than USB 2.0. This means that data transfer rates will be significantly improved, allowing for faster file transfers and quicker device syncing. USB 3.0 also offers higher power output, making it more efficient for charging devices. Overall, the upgrade to USB 3.0 provides a substantial improvement in speed and performance compared to the previous USB 2.0 standard.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 24, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
April Fools' Day 2009 saw concern on the internet around which new...
What type of cyber-attack involves attaching other activities to an...
What is the name for the part of the wireless signal which...
What term applies to a group of computers infected with code allowing...
What designation is given to the part of the radio spectrum used for...
What term refers to using a mouse to initiate a voice communication?
A pair of one-way encryption keys, one public and one private, is...
Used in VoIP, "SIP" is an abbreviation for which protocol?
A drop in VoIP quality when using many other programs on a PC can be...
What general-purpose Internet encryption protocol, published in 1999,...
What general term is used to describe a program that reports on one...
What does "PGP" stand for in an early home encryption tool?
What term is used for PC software to emulate telephone functionality...
In 2008, Dan Kaminsky found a major flaw in what critical networking...
The revised USB 3.0 standard is expected to be up to how many times...
Alert!

Advertisement