Test Your Knowledge On Computers

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 2601 | Total Attempts: 9,147,858
Questions: 15 | Attempts: 326

SettingsSettingsSettings
Test Your Knowledge On Computers - Quiz

Can you answer all these questions about Computers?


Questions and Answers
  • 1. 

    Which cable company led in VoIP market share going into 2008?

    • A.

      Comcast

    • B.

      Liberty

    • C.

      Insight

    • D.

      Cox Communications

    Correct Answer
    A. Comcast
    Explanation
    Comcast led in VoIP market share going into 2008.

    Rate this question:

  • 2. 

    Which of these is likely to be part of a Unified Communication setup?

    • A.

      Photocopiers

    • B.

      Instant Messaging

    • C.

      Interoffice Envelopes

    • D.

      Overnight Mail Delivery

    Correct Answer
    B. Instant Messaging
    Explanation
    Instant Messaging is likely to be part of a Unified Communication setup because it allows real-time communication and collaboration between individuals or groups. It enables users to send text messages, share files, and even have audio or video calls, making it an essential tool for effective communication within an organization. Unlike photocopiers, interoffice envelopes, and overnight mail delivery, which are traditional means of communication, instant messaging aligns with the modern and efficient communication methods offered by Unified Communication systems.

    Rate this question:

  • 3. 

    Which networking technology's name is derived from that of a 10th-century Danish king?

    • A.

      Wi-Fi

    • B.

      Dangles

    • C.

      Bluetooth

    • D.

      Oracle

    Correct Answer
    C. Bluetooth
    Explanation
    Bluetooth technology is named after Harald Bluetooth, a 10th-century Danish king. He was known for his ability to unite warring factions, just as Bluetooth technology unites different devices by enabling them to communicate wirelessly. The name "Bluetooth" was chosen to symbolize the technology's ability to bring devices together and create connections.

    Rate this question:

  • 4. 

    IDS products are used to record hack attempts; what does IDS stand for?

    • A.

      Investigation Direct Service

    • B.

      Internal Device Scanner

    • C.

      Intrusion Detection System

    • D.

      Isolated Device Service

    Correct Answer
    C. Intrusion Detection System
    Explanation
    IDS stands for Intrusion Detection System. IDS products are used to record hack attempts. These systems monitor network traffic and identify any suspicious or unauthorized activity, such as attempts to breach security measures or access sensitive information. By detecting and recording these hack attempts, IDS helps in identifying and mitigating potential security threats to the network.

    Rate this question:

  • 5. 

    In networking security, an ACL is what type of list?

    • A.

      Allowed Client

    • B.

      Access Control

    • C.

      Actual Contact

    • D.

      Acquired Control

    Correct Answer
    B. Access Control
    Explanation
    An ACL in networking security refers to an Access Control List. This list is used to define and enforce rules or permissions for network traffic. It determines which users or systems are allowed or denied access to network resources based on various criteria such as IP addresses, port numbers, or protocols. By using an ACL, network administrators can effectively control and manage the flow of traffic within a network, enhancing security and preventing unauthorized access.

    Rate this question:

  • 6. 

    What type of attack is designed to render the targets unusable?

    • A.

      Replication Attack

    • B.

      Service Interruption Attack

    • C.

      Process Corruption Attack

    • D.

      Denial Of Service Attack

    Correct Answer
    D. Denial Of Service Attack
    Explanation
    A Denial of Service (DoS) attack is designed to render the targets unusable by overwhelming them with a flood of illegitimate requests or by exploiting vulnerabilities in the target's system. This attack aims to exhaust the target's resources such as bandwidth, processing power, or memory, causing the target to become unresponsive or crash. The goal of a DoS attack is to disrupt the normal functioning of a system or network, making it unavailable to its intended users.

    Rate this question:

  • 7. 

    An IP address starting with 192.168 can be known to be what type of address?

    • A.

      US Government Address

    • B.

      Email Server Address

    • C.

      Malicious Site Address

    • D.

      Private Network Address

    Correct Answer
    D. Private Network Address
    Explanation
    An IP address starting with 192.168 is known to be a private network address. Private network addresses are used within a local area network (LAN) and are not routable on the internet. They are commonly used by home networks, small businesses, and organizations to create their own private network for internal use. These addresses are reserved and cannot be assigned to devices on the public internet.

    Rate this question:

  • 8. 

    A wireless network can be known by what four-letter identifier?

    • A.

      DNID

    • B.

      IPID

    • C.

      SSID

    • D.

      RPID

    Correct Answer
    C. SSID
    Explanation
    A wireless network can be identified by its SSID (Service Set Identifier). The SSID is a unique name assigned to a wireless network, allowing devices to connect to the correct network. It is typically a combination of letters, numbers, and symbols.

    Rate this question:

  • 9. 

    In a VoIP setup, what is an ATA?

    • A.

      Average Talk Allowance

    • B.

      Analog Telephone Adaptor

    • C.

      Airtime Tracking Assistant

    • D.

      Aerial Transmission Adaptor

    Correct Answer
    B. Analog Telephone Adaptor
    Explanation
    An ATA, in a VoIP setup, stands for Analog Telephone Adaptor. It is a device that allows analog telephones to connect to a digital network, such as the internet, to enable Voice over IP communication. The ATA converts the analog voice signals from the telephone into digital signals that can be transmitted over the IP network. It also converts the digital signals received from the IP network back into analog signals that can be understood by the telephone. This enables users to make and receive phone calls using their traditional analog telephones over the internet.

    Rate this question:

  • 10. 

    What company's Unified Communication manager product used to be called "Call Manager"?

    • A.

      Intel's

    • B.

      IBM's

    • C.

      Adobe's

    • D.

      Cisco's

    Correct Answer
    D. Cisco's
    Explanation
    Cisco's Unified Communication manager product used to be called "Call Manager". Cisco is a well-known technology company that offers a wide range of networking and communication solutions. Their Unified Communication manager, previously known as "Call Manager", is a software-based call processing system that provides various features for IP telephony, video conferencing, voicemail, and more. This name change may have been done to better reflect the product's capabilities and the broader scope of communication services it offers.

    Rate this question:

  • 11. 

    Which VoIP company was founded by Niklas Zennstrom and purchased by eBay?

    • A.

      Skype

    • B.

      Lingo

    • C.

      Apple

    • D.

      Lenovo

    Correct Answer
    A. Skype
    Explanation
    Skype is the correct answer because it was indeed founded by Niklas Zennstrom and later purchased by eBay. Skype is a popular VoIP (Voice over Internet Protocol) company that allows users to make voice and video calls over the internet. It was founded in 2003 and acquired by eBay in 2005 for $2.6 billion. eBay later sold Skype to a group of investors in 2009.

    Rate this question:

  • 12. 

    In Unified Communication, what system routes multiple message types to one inbox?

    • A.

      Unified Messaging

    • B.

      Port Forwarding

    • C.

      Voice Mail Routing

    • D.

      Twitter

    Correct Answer
    A. Unified Messaging
    Explanation
    Unified Messaging is the correct answer because it refers to a system that combines different types of communication messages, such as voicemail, emails, and faxes, into a single inbox. This allows users to access and manage all their messages from one central location, improving efficiency and convenience. Port Forwarding, Voice Mail Routing, and Twitter are not relevant to the question and do not involve routing multiple message types to one inbox.

    Rate this question:

  • 13. 

    The T-Mobile HTC G1 phone came with which free mobile OS from Google?

    • A.

      Android

    • B.

      Cupid

    • C.

      DreamOS

    • D.

      Braindrain

    Correct Answer
    A. Android
    Explanation
    The correct answer is Android. The T-Mobile HTC G1 phone came with the free mobile operating system developed by Google called Android.

    Rate this question:

  • 14. 

    Which of these features is important specifically in corporate instant messaging?

    • A.

      Auditability

    • B.

      Multiple Fonts

    • C.

      Smilies

    • D.

      Buddy Lists

    Correct Answer
    A. Auditability
    Explanation
    Auditability is an important feature specifically in corporate instant messaging. It allows companies to track and monitor the communication that takes place within the messaging platform. This feature ensures compliance with regulatory requirements, helps prevent misuse or unauthorized sharing of sensitive information, and provides a record for auditing purposes. It allows companies to maintain transparency and accountability in their communication channels, which is crucial in a corporate environment.

    Rate this question:

  • 15. 

    Which VoIP-only provider was highest in market share going into 2008?

    • A.

      Jaxtr

    • B.

      Skype

    • C.

      Vonage

    • D.

      Lingo

    Correct Answer
    C. Vonage
    Explanation
    Vonage was the highest VoIP-only provider in market share going into 2008. This means that Vonage had the largest percentage of the market compared to other VoIP-only providers such as Jaxtr, Skype, and Lingo. Vonage's popularity and customer base were likely factors contributing to its high market share at that time.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.