Test Your Knowledge On Computers

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Attempts: 332 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. Which of these is likely to be part of a Unified Communication setup?

Explanation

Instant Messaging is likely to be part of a Unified Communication setup because it allows real-time communication and collaboration between individuals or groups. It enables users to send text messages, share files, and even have audio or video calls, making it an essential tool for effective communication within an organization. Unlike photocopiers, interoffice envelopes, and overnight mail delivery, which are traditional means of communication, instant messaging aligns with the modern and efficient communication methods offered by Unified Communication systems.

Submit
Please wait...
About This Quiz
Test Your Knowledge On Computers - Quiz

Test your knowledge on Computers with a focus on networking and security. This quiz assesses understanding of VoIP market share, unified communication components, Bluetooth, intrusion detection, access control,... see moreand denial of service attacks. see less

2. The T-Mobile HTC G1 phone came with which free mobile OS from Google?

Explanation

The correct answer is Android. The T-Mobile HTC G1 phone came with the free mobile operating system developed by Google called Android.

Submit
3. What type of attack is designed to render the targets unusable?

Explanation

A Denial of Service (DoS) attack is designed to render the targets unusable by overwhelming them with a flood of illegitimate requests or by exploiting vulnerabilities in the target's system. This attack aims to exhaust the target's resources such as bandwidth, processing power, or memory, causing the target to become unresponsive or crash. The goal of a DoS attack is to disrupt the normal functioning of a system or network, making it unavailable to its intended users.

Submit
4. An IP address starting with 192.168 can be known to be what type of address?

Explanation

An IP address starting with 192.168 is known to be a private network address. Private network addresses are used within a local area network (LAN) and are not routable on the internet. They are commonly used by home networks, small businesses, and organizations to create their own private network for internal use. These addresses are reserved and cannot be assigned to devices on the public internet.

Submit
5. A wireless network can be known by what four-letter identifier?

Explanation

A wireless network can be identified by its SSID (Service Set Identifier). The SSID is a unique name assigned to a wireless network, allowing devices to connect to the correct network. It is typically a combination of letters, numbers, and symbols.

Submit
6. Which networking technology's name is derived from that of a 10th-century Danish king?

Explanation

Bluetooth technology is named after Harald Bluetooth, a 10th-century Danish king. He was known for his ability to unite warring factions, just as Bluetooth technology unites different devices by enabling them to communicate wirelessly. The name "Bluetooth" was chosen to symbolize the technology's ability to bring devices together and create connections.

Submit
7. In networking security, an ACL is what type of list?

Explanation

An ACL in networking security refers to an Access Control List. This list is used to define and enforce rules or permissions for network traffic. It determines which users or systems are allowed or denied access to network resources based on various criteria such as IP addresses, port numbers, or protocols. By using an ACL, network administrators can effectively control and manage the flow of traffic within a network, enhancing security and preventing unauthorized access.

Submit
8. IDS products are used to record hack attempts; what does IDS stand for?

Explanation

IDS stands for Intrusion Detection System. IDS products are used to record hack attempts. These systems monitor network traffic and identify any suspicious or unauthorized activity, such as attempts to breach security measures or access sensitive information. By detecting and recording these hack attempts, IDS helps in identifying and mitigating potential security threats to the network.

Submit
9. In a VoIP setup, what is an ATA?

Explanation

An ATA, in a VoIP setup, stands for Analog Telephone Adaptor. It is a device that allows analog telephones to connect to a digital network, such as the internet, to enable Voice over IP communication. The ATA converts the analog voice signals from the telephone into digital signals that can be transmitted over the IP network. It also converts the digital signals received from the IP network back into analog signals that can be understood by the telephone. This enables users to make and receive phone calls using their traditional analog telephones over the internet.

Submit
10. In Unified Communication, what system routes multiple message types to one inbox?

Explanation

Unified Messaging is the correct answer because it refers to a system that combines different types of communication messages, such as voicemail, emails, and faxes, into a single inbox. This allows users to access and manage all their messages from one central location, improving efficiency and convenience. Port Forwarding, Voice Mail Routing, and Twitter are not relevant to the question and do not involve routing multiple message types to one inbox.

Submit
11. Which VoIP company was founded by Niklas Zennstrom and purchased by eBay?

Explanation

Skype is the correct answer because it was indeed founded by Niklas Zennstrom and later purchased by eBay. Skype is a popular VoIP (Voice over Internet Protocol) company that allows users to make voice and video calls over the internet. It was founded in 2003 and acquired by eBay in 2005 for $2.6 billion. eBay later sold Skype to a group of investors in 2009.

Submit
12. Which cable company led in VoIP market share going into 2008?

Explanation

Comcast led in VoIP market share going into 2008.

Submit
13. Which of these features is important specifically in corporate instant messaging?

Explanation

Auditability is an important feature specifically in corporate instant messaging. It allows companies to track and monitor the communication that takes place within the messaging platform. This feature ensures compliance with regulatory requirements, helps prevent misuse or unauthorized sharing of sensitive information, and provides a record for auditing purposes. It allows companies to maintain transparency and accountability in their communication channels, which is crucial in a corporate environment.

Submit
14. Which VoIP-only provider was highest in market share going into 2008?

Explanation

Vonage was the highest VoIP-only provider in market share going into 2008. This means that Vonage had the largest percentage of the market compared to other VoIP-only providers such as Jaxtr, Skype, and Lingo. Vonage's popularity and customer base were likely factors contributing to its high market share at that time.

Submit
15. What company's Unified Communication manager product used to be called "Call Manager"?

Explanation

Cisco's Unified Communication manager product used to be called "Call Manager". Cisco is a well-known technology company that offers a wide range of networking and communication solutions. Their Unified Communication manager, previously known as "Call Manager", is a software-based call processing system that provides various features for IP telephony, video conferencing, voicemail, and more. This name change may have been done to better reflect the product's capabilities and the broader scope of communication services it offers.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of these is likely to be part of a Unified Communication setup?
The T-Mobile HTC G1 phone came with which free mobile OS from Google?
What type of attack is designed to render the targets unusable?
An IP address starting with 192.168 can be known to be what type of...
A wireless network can be known by what four-letter identifier?
Which networking technology's name is derived from that of a...
In networking security, an ACL is what type of list?
IDS products are used to record hack attempts; what does IDS stand...
In a VoIP setup, what is an ATA?
In Unified Communication, what system routes multiple message types to...
Which VoIP company was founded by Niklas Zennstrom and purchased by...
Which cable company led in VoIP market share going into 2008?
Which of these features is important specifically in corporate instant...
Which VoIP-only provider was highest in market share going into 2008?
What company's Unified Communication manager product used to be called...
Alert!

Advertisement