Interesting Trivia On Computers

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 2572 | Total Attempts: 9,186,829
Questions: 18 | Attempts: 210

SettingsSettingsSettings
Interesting Trivia On Computers - Quiz

Do you know enough about Computers? Take this quiz and find out


Questions and Answers
  • 1. 

    MD2, MD5 and SHA-1 are examples of what type of function to checksum an entire file?

    • A.

      Message Consolidation

    • B.

      Error Registration

    • C.

      Encryption Control

    • D.

      Message Digest

    Correct Answer
    D. Message Digest
    Explanation
    MD2, MD5, and SHA-1 are examples of message digest functions used to checksum an entire file. Message digest functions take a file as input and produce a fixed-size hash value, also known as a message digest or checksum. This checksum is unique to the input file, and even a small change in the file will result in a significantly different checksum. Therefore, message digest functions are commonly used to verify the integrity of files and ensure they have not been tampered with.

    Rate this question:

  • 2. 

    What technology developed by Vivek Pai may improve web access for the developing world?

    • A.

      Firewire

    • B.

      HashCache

    • C.

      Netbooks

    • D.

      Smartphones

    Correct Answer
    B. HashCache
    Explanation
    HashCache is a technology developed by Vivek Pai that may improve web access for the developing world. HashCache is a caching system that reduces the latency of web page loading by storing frequently accessed content closer to the user. This technology can help improve web access in areas with limited internet connectivity or slower network speeds, as it reduces the need for repeated data requests from distant servers. By caching popular content locally, HashCache can significantly improve the browsing experience and make web access more efficient in the developing world.

    Rate this question:

  • 3. 

    Which wireless standard, promising faster speeds, inched towards ratification during 2009?

    • A.

      802.11x

    • B.

      802.11q

    • C.

      802.11n

    • D.

      ISAM 2814

    Correct Answer
    C. 802.11n
    Explanation
    802.11n is the correct answer because it is a wireless standard that was in the process of being ratified during 2009. This standard promised faster speeds compared to previous wireless standards.

    Rate this question:

  • 4. 

    Future memory chips may utilize so-called racetrack memory, based on what items?

    • A.

      Flux Capacitors

    • B.

      Quantum Diodes

    • C.

      Magnetic Nanowires

    • D.

      Fuzzy Cells

    Correct Answer
    C. Magnetic Nanowires
    Explanation
    Future memory chips may utilize racetrack memory, which is based on magnetic nanowires. Racetrack memory is a type of non-volatile memory technology that uses the movement of magnetic domains along nanowires to store and retrieve data. These nanowires act as "racetracks" where the data can be stored and accessed. This technology has the potential to provide higher storage density, faster data transfer rates, and lower power consumption compared to traditional memory technologies.

    Rate this question:

  • 5. 

    How many bits are used in DES encryption?

    • A.

      56

    • B.

      128

    • C.

      64

    • D.

      92

    Correct Answer
    A. 56
    Explanation
    DES encryption uses a key length of 56 bits. This means that the key used for encryption in DES is 56 bits long. The key length is important because it determines the strength and security of the encryption algorithm. In the case of DES, the relatively small key length of 56 bits has led to vulnerabilities and it is no longer considered secure for modern encryption purposes.

    Rate this question:

  • 6. 

    Which ITU standard gives guidelines for real-time voice communication on the Internet?

    • A.

      K.129

    • B.

      H.323

    • C.

      Turk-186

    • D.

      RFC 1392

    Correct Answer
    B. H.323
    Explanation
    H.323 is the correct answer because it is an ITU standard that provides guidelines for real-time voice communication over IP networks, including the Internet. It defines protocols for establishing, controlling, and terminating multimedia sessions, allowing for audio, video, and data communication. H.323 has been widely adopted and is used in various applications such as video conferencing, voice over IP (VoIP) systems, and unified communications.

    Rate this question:

  • 7. 

    Which intrusion technique involves sequentially scanning IP addresses?

    • A.

      Active Server Invasion

    • B.

      Address Space Probe

    • C.

      Alarm Suspension Attack

    • D.

      Service Network Scan

    Correct Answer
    B. Address Space Probe
    Explanation
    The intrusion technique that involves sequentially scanning IP addresses is known as Address Space Probe. In this technique, the attacker systematically scans a range of IP addresses to identify vulnerable systems or services. By scanning sequentially, the attacker can cover a large number of IP addresses and potentially discover targets for further exploitation. This technique is commonly used to gather information about a network and identify potential entry points for an attack.

    Rate this question:

  • 8. 

    What does "DSSS" stand for in the technology used in 802.11b networking?

    • A.

      Direct-Source System-Specific

    • B.

      Download Speed Sensing Software

    • C.

      Direct-Sequence Spread-Spectrum

    • D.

      Dynamic System Search Scanning

    Correct Answer
    C. Direct-Sequence Spread-Spectrum
    Explanation
    DSSS stands for Direct-Sequence Spread-Spectrum in the technology used in 802.11b networking. Direct-Sequence Spread-Spectrum is a method of transmitting data over a radio frequency by spreading the signal across a wide bandwidth. This technique helps to improve the reliability and security of wireless communication by reducing interference and increasing resistance to jamming.

    Rate this question:

  • 9. 

    What type of byte-by-byte encryption can be used on devices with little memory?

    • A.

      Stream Cypher

    • B.

      Port Forwarding

    • C.

      Octet Encryption System

    • D.

      Route Encoding

    Correct Answer
    A. Stream Cypher
    Explanation
    Stream ciphers are a type of byte-by-byte encryption that can be used on devices with limited memory. Unlike block ciphers, which encrypt data in fixed-size blocks, stream ciphers encrypt data one byte at a time. This makes them suitable for devices with little memory, as they require less storage space to operate efficiently. Stream ciphers generate a keystream, which is combined with the plaintext using a bitwise XOR operation to produce the ciphertext. This process can be performed on the fly, making stream ciphers a practical choice for devices with limited resources.

    Rate this question:

  • 10. 

    What standard gives the ability to monitor and control network traffic remotely?

    • A.

      OpenFlow

    • B.

      X10Net

    • C.

      DownStream

    • D.

      SmartWeb

    Correct Answer
    A. OpenFlow
    Explanation
    OpenFlow is a standard that allows for the remote monitoring and control of network traffic. It provides a centralized control plane that separates the control and data planes in a network, enabling network administrators to have a global view of the network and make changes to traffic flows remotely. With OpenFlow, administrators can easily manage and optimize network performance, troubleshoot issues, and implement policies across multiple switches and routers. It offers flexibility and scalability, making it a powerful tool for network management.

    Rate this question:

  • 11. 

    Who sells the ASA 5500 series of firewall products?

    • A.

      Cisco

    • B.

      ADM

    • C.

      Apple

    • D.

      Intel

    Correct Answer
    A. Cisco
    Explanation
    Cisco sells the ASA 5500 series of firewall products.

    Rate this question:

  • 12. 

    WEP is a form of encryption used with wireless networks, in which "WEP" stands for what?

    • A.

      Windows Established Protocol

    • B.

      Wireless Engagement Protocol

    • C.

      Wired Equivalent Privacy

    • D.

      Wireless Enabled Protection

    Correct Answer
    C. Wired Equivalent Privacy
    Explanation
    Wired Equivalent Privacy (WEP) is a form of encryption used with wireless networks. It was designed to provide a level of security comparable to that of a wired network. WEP encrypts data transmitted over the network to prevent unauthorized access and eavesdropping. Despite its initial popularity, WEP has been found to have significant vulnerabilities and is no longer considered secure.

    Rate this question:

  • 13. 

    What algorithm allows exchanging a secret key over an insecure medium without prior keys?

    • A.

      Higgs-Gibson

    • B.

      Diffie-Hellman

    • C.

      Euler-Wetzel

    • D.

      Ryan-Zimmerman

    Correct Answer
    B. Diffie-Hellman
    Explanation
    The Diffie-Hellman algorithm allows exchanging a secret key over an insecure medium without prior keys. This algorithm is based on the concept of modular exponentiation and uses the properties of prime numbers to ensure secure key exchange. It allows two parties to independently generate their own public and private keys, which are then used to compute a shared secret key without ever transmitting it directly. This shared secret key can then be used for secure communication or encryption purposes.

    Rate this question:

  • 14. 

    A 2008 post on a message board for which disease caused a disease attack in some readers?

    • A.

      Epilepsy

    • B.

      Lupus

    • C.

      Glaucoma

    • D.

      Diabetes

    Correct Answer
    A. Epilepsy
    Explanation
    The 2008 post on a message board suggests that there was a discussion about a disease causing a disease attack in some readers. Out of the given options, epilepsy is the most likely answer as it is a neurological disorder characterized by recurrent seizures or attacks.

    Rate this question:

  • 15. 

    Bluetooth is one example of which kind of network, abbreviated "WPAN"?

    • A.

      Wireless Ping Activated Network

    • B.

      Wireless Personal Area Network

    • C.

      Wireless Protocol Action Network

    • D.

      Wireless Protected Area Network

    Correct Answer
    B. Wireless Personal Area Network
    Explanation
    Bluetooth is an example of a Wireless Personal Area Network (WPAN). A WPAN is a type of network that connects devices within a short range, typically within 10 meters. Bluetooth technology allows for wireless communication between devices such as smartphones, laptops, and headphones, making it a perfect example of a WPAN.

    Rate this question:

  • 16. 

    What standard has been proposed for encrypting and authenticating Internet e-mail data?

    • A.

      XML++

    • B.

      S/MIME

    • C.

      Mailman 3.0

    • D.

      ESecure

    Correct Answer
    B. S/MIME
    Explanation
    S/MIME (Secure/Multipurpose Internet Mail Extensions) is the correct answer for the proposed standard for encrypting and authenticating Internet e-mail data. S/MIME is a widely-used protocol that provides a secure way to send and receive emails by encrypting the message content and digitally signing it to ensure its authenticity. It is supported by most email clients and provides end-to-end security for email communication.

    Rate this question:

  • 17. 

    The SHA-1 function produces a number with how many bits?

    • A.

      88

    • B.

      1024

    • C.

      160

    • D.

      256

    Correct Answer
    C. 160
    Explanation
    The SHA-1 function produces a number with 160 bits. SHA-1 is a cryptographic hash function that takes an input and produces a fixed-size output of 160 bits. This output, also known as a hash value, is commonly used for data integrity and security purposes. The 160-bit length provides a good balance between security and efficiency in most applications.

    Rate this question:

  • 18. 

    What term describes a brief fluctuation in a VoIP transmission signal?

    • A.

      Murmur

    • B.

      Quaver

    • C.

      Harmonic

    • D.

      Jitter

    Correct Answer
    D. Jitter
    Explanation
    Jitter is the correct answer because it refers to a brief fluctuation in a VoIP transmission signal. It is commonly caused by network congestion, packet loss, or varying delays in the transmission. Jitter can result in poor call quality, including choppy or distorted audio. To mitigate jitter, techniques such as buffering, packet prioritization, and jitter buffers are often used in VoIP systems.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.