The Big Quiz On Computers

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Alfredhook3
A
Alfredhook3
Community Contributor
Quizzes Created: 2940 | Total Attempts: 2,642,816
Questions: 15 | Attempts: 635

SettingsSettingsSettings
The Big Quiz On Computers - Quiz

Test your Knowledge about Computers.


Questions and Answers
  • 1. 

    What term refers to a set of programs used to access and gain admin access to a system?

    • A.

      Burglars Tools

    • B.

      Router

    • C.

      Rootkit

    • D.

      Green Bag

    Correct Answer
    C. Rootkit
    Explanation
    A rootkit is a set of programs that are designed to gain unauthorized access and administrative control over a computer system. It allows attackers to hide their presence and activities on the system, making it difficult for users or security tools to detect their malicious actions. Rootkits are commonly used by hackers to gain control over a system and carry out various malicious activities, such as stealing sensitive information, modifying system settings, or launching further attacks.

    Rate this question:

  • 2. 

    In order to enhance security, TKIP encryption periodically changes what?

    • A.

      The Encryption Key

    • B.

      The Server Name

    • C.

      The System Date

    • D.

      The Checksum Algorithm

    Correct Answer
    A. The Encryption Key
    Explanation
    TKIP encryption periodically changes the Encryption Key. This is done to enhance security by preventing unauthorized access to the network. By regularly changing the Encryption Key, it becomes more difficult for potential attackers to decipher the encrypted data and gain unauthorized access to the network. This helps to protect the confidentiality and integrity of the transmitted data.

    Rate this question:

  • 3. 

    A May, 2009 release of a new version of which Google browser promised faster access?

    • A.

      Chrome

    • B.

      Laser

    • C.

      GBrowse

    • D.

      Neon

    Correct Answer
    A. Chrome
    Explanation
    The correct answer is "Chrome." In May 2009, Google released a new version of their browser, Chrome, which promised faster access.

    Rate this question:

  • 4. 

    In VoIP, what term refers to the loss of speech-signal components, typically parts of words?

    • A.

      Interference

    • B.

      Slashing

    • C.

      Hooking

    • D.

      Clipping

    Correct Answer
    D. Clipping
    Explanation
    Clipping is the term in VoIP that refers to the loss of speech-signal components, typically parts of words. This can occur when the signal level exceeds the maximum limit of the system, causing distortion and truncation of the audio waveform. It results in the speaker's voice sounding cut off or distorted, making it difficult to understand the speech.

    Rate this question:

  • 5. 

    What term refers to usually-public places for people to get wireless access to the Internet?

    • A.

      Netspot

    • B.

      Hotlink

    • C.

      Hotspot

    • D.

      Netgear

    Correct Answer
    C. Hotspot
    Explanation
    A hotspot refers to usually-public places where people can access the Internet wirelessly. It is a location that provides Wi-Fi connectivity to users, allowing them to connect their devices and access the Internet. Hotspots are commonly found in cafes, airports, hotels, and other public areas where people may need to connect to the Internet while on the go.

    Rate this question:

  • 6. 

    What term applies to the designation of traffic type for a connection, such as HTTP's 80?

    • A.

      IP Address

    • B.

      Message Code

    • C.

      Connect String

    • D.

      Port

    Correct Answer
    D. Port
    Explanation
    The term that applies to the designation of traffic type for a connection, such as HTTP's 80, is "Port". In computer networking, a port is a communication endpoint that is used to identify specific processes or services on a networked device. Ports are assigned specific numbers, and each number is associated with a particular protocol or service. In this case, HTTP typically uses port number 80 to establish a connection.

    Rate this question:

  • 7. 

    2009 saw the release of what new smartphone from Palm?

    • A.

      Pre

    • B.

      PPhone

    • C.

      Trius

    • D.

      Xamin

    Correct Answer
    A. Pre
    Explanation
    In 2009, Palm released a new smartphone called the Pre.

    Rate this question:

  • 8. 

    When referred to in computer networking, what is "WLAN"?

    • A.

      Warning Level Across Network

    • B.

      Wireless Leased Area Node

    • C.

      Wireless Local Area Network

    • D.

      Wasted Leaps Across Nodes

    Correct Answer
    C. Wireless Local Area Network
    Explanation
    WLAN stands for Wireless Local Area Network. It is a type of computer network that allows devices to connect and communicate wirelessly within a limited area, such as a home, office, or campus. This technology uses radio waves to transmit data between devices, eliminating the need for physical cables. WLANs provide flexibility and convenience for users, as they can access the network and internet from anywhere within the coverage area.

    Rate this question:

  • 9. 

    What network feature is used to make emergency calls over VoIP?

    • A.

      711 Supreme

    • B.

      VoIP Alert

    • C.

      Enhanced 911

    • D.

      Mega 911

    Correct Answer
    C. Enhanced 911
    Explanation
    Enhanced 911 is the correct answer because it is a network feature that allows emergency calls to be made over VoIP (Voice over Internet Protocol). Enhanced 911 provides the ability to automatically transmit the caller's location information to emergency services, enabling them to quickly respond to the emergency. This feature is crucial in ensuring that emergency calls made over VoIP are properly routed and responded to in a timely manner.

    Rate this question:

  • 10. 

    What term, borrowed from warfare, describes a partially secure network outside a firewall?

    • A.

      DMZ

    • B.

      Friendly Fire

    • C.

      Green Zone

    • D.

      ROI

    Correct Answer
    A. DMZ
    Explanation
    A DMZ, which stands for Demilitarized Zone, is a term borrowed from warfare that describes a partially secure network outside a firewall. In computer networking, a DMZ is a separate network segment that is used to host publicly accessible servers, such as web servers, while keeping them isolated from the internal network. This allows for an additional layer of security by placing a buffer zone between the internet and the internal network, reducing the risk of unauthorized access to sensitive information.

    Rate this question:

  • 11. 

    What kind of packet filtering considers delivery conditions and context?

    • A.

      Stateful

    • B.

      Intelligent

    • C.

      Generic

    • D.

      Mobile

    Correct Answer
    A. Stateful
    Explanation
    Stateful packet filtering considers delivery conditions and context. It examines the state of a connection by keeping track of the packets sent and received. This allows it to make more informed decisions about whether to allow or block packets based on the current state of the connection. Stateful packet filtering is able to take into account factors such as the source and destination IP addresses, ports, and the sequence and acknowledgment numbers of packets.

    Rate this question:

  • 12. 

    The RSA cryptography algorithm was invented by Ron Rivest, Adi Shamir and who else?

    • A.

      Walter Erkis

    • B.

      Bill Gates

    • C.

      Leonard Adleman

    • D.

      Roger Daltrey

    Correct Answer
    C. Leonard Adleman
    Explanation
    The correct answer is Leonard Adleman. He, along with Ron Rivest and Adi Shamir, invented the RSA cryptography algorithm.

    Rate this question:

  • 13. 

    Which three-key cryptographic algorithm is used by the U.S. to encrypt non-classified data?

    • A.

      Triple-DES

    • B.

      TRES

    • C.

      SAS Trio

    • D.

      3Com

    Correct Answer
    A. Triple-DES
    Explanation
    Triple-DES is the correct answer because it is a three-key cryptographic algorithm that is commonly used by the U.S. to encrypt non-classified data. This algorithm applies the Data Encryption Standard (DES) algorithm three times to each data block, making it more secure than the original DES algorithm. Triple-DES provides a higher level of encryption and is widely adopted for securing sensitive information in various industries.

    Rate this question:

  • 14. 

    In network security, what does the abbreviation "SSL" stand for?

    • A.

      Secret Session Link

    • B.

      Safe Session Logon

    • C.

      Secure Sockets Layer

    • D.

      Simple Security Limits

    Correct Answer
    C. Secure Sockets Layer
    Explanation
    SSL stands for Secure Sockets Layer. It is a cryptographic protocol that provides secure communication over a computer network. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted or tampered with by unauthorized parties. It is commonly used to secure online transactions, such as credit card payments, and to protect sensitive information, such as login credentials. SSL has been widely replaced by Transport Layer Security (TLS), but the term SSL is still commonly used to refer to the newer protocol versions as well.

    Rate this question:

  • 15. 

    What type of message has a hidden message encoded within the obvious external message?

    • A.

      Steganographic

    • B.

      Algebraic

    • C.

      Trigonometric

    • D.

      Orwellian

    Correct Answer
    A. SteganograpHic
    Explanation
    Steganographic messages have a hidden message encoded within the obvious external message. Steganography is the practice of concealing information within another form of data, such as an image or audio file. The hidden message is typically only accessible to those who know the method of extraction or decryption. This technique is often used for covert communication or to protect sensitive information. Algebraic, trigonometric, and Orwellian do not involve the concealment of hidden messages within an external message.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Alfredhook3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.