Browse Definitions:
Quiz

Quiz: OMG! Another IM Lingo Challenge 4U

RU an IM guru? Review WhatIs.com's list of Chat Abbreviations and then test your newfound knowledge with this fun quiz. See if we can get you ROTFL -- or at least give you a BEG. Write down your answers and then scroll to the end to see how well you did.

1. It's Friday afternoon at work and your old school roommate IMs you a link with "NSFW" afterwards. Should you check it out then or wait?

2. You're chatting with a coworker on a BlackBerry about a recent promotion and she IMs you to "RBTL" about the situation. What is she trying to tell you?

3. If you're talking with your tech support guru and he IMs you that the problem the problem described in your help ticket is "PEBCAK," what does he mean?

4. You've been chatting with a remote client for half an hour resolving a conflict when suddenly she enters "BRB" and goes quiet for five minutes. What did she mean?

5. Your computer guru gave notice two weeks ago is packing up to move to the next gig. You text him about a weird issue with the WiFi and keep getting "NMP" back. What is he trying to tell you?

6. You're about to update the company Web site and notice a word that seems oddly formed, "Flickr." Marketing texts you back that "SIC." What does that mean?

7. You've been chasing down an unusual adapter all day for your new remote disk backup. A friend, when asked, promptly texts about you whether you consulted an internal "SME." What did she mean?

8. It's been a long day and the tech working on your PC has methodically checked your connections, grounded himself before opening up the machine, carefully placed each screw in the order they were removed and diagnosed the problem. When closing the help desk ticket, you comment on how happy you are with such thorough treatment. He simply IMs back "SOP." What does he mean?

9. You begin to describe a wild weekend with your friends and a coworker responds with "TMI!" What does he mean?

10. After a long weekend, your cubicle mate shows up glowing. When pressed, she admits to having met a SNAG over the weekend. Who (or what) in the world might she be talking about?

____________________________________________________________________

Check your answers:

1. Answer: Absolutely NOT! That means "Not Safe For Work" -- wait until you get onto your home PC and off of the corporate network.

2. Answer: She's telling you to "Read Between The Lines". There may be something subtle going on with workplace politics.

3. Answer: He's telling you that the issue is a "Problem Exists Between Computer And Keyboard" aka the problem is carbon-based, not silicon-based. The issue is the user, not the machine.

4. Answer: She was telling you that she'll "Be Right Back". Just hold on and she'll return to the chat.

5. Answer: Unfortunately, your departing techie is letting you know that this kind of trouble shooting is "Not My Problem". Better find out who knows how to deal with a wireless router!

6. Answer: "Spelling Is Correct". Flickr is one of those Web 2.0 terms that dropped a vowel.

7. Answer: She's asking whether you asked a "Subject Matter Expert" where to find what you needed. Usually, if you ask the right person the right question, your day is much less frustrating.

8. Answer: He meant that it's "Standard Operating Procedure". In other words, he treats every case with equal care and consideration.

9. Answer: "Too Much Information!" Time to dial back the gruesome details and just say that you had a good weekend.

10. Answer: She met a "Sensitive New Age Guy". While this particular brand of man isn't for everyone, they're sufficiently rare to cause some excitement on occasion.

How many could you guess correctly without peeking? Let us know!

RU IM savvy? Try this IM quiz on for size or see all our quizzes.

Want to learn more? Review our guide, Learn IT: Instant Messaging in the Enterprise

This was last updated in May 2012

Join the conversation

3 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Hi guys, I’m new here (first post woo!) and I have been way into learning all I can about making quizzes

I found this text pert Trivia game on Youtube..
It's interactive and makes use of the annotation function. and better yet, it doesn’t try to make you buy something or fill out some silly form.


Anyway, I wanted to share it here
http://www.youtube.com/watch?v=RpzoJUbpBOU
Cancel
Actually, the answer to number three has the acronym meaning wrong. PEBCAK means "Problem Exists Between Chair and Keyboard" as this is where the user exists. There is a cable (or wireless connection) between the Computer and Keyboard so this translation would not indicate a user issue.
Cancel
Number 6 --wrong. Sic is short for the Latin word Sicut which means 'just as'. Seeing this could mean one of two this. a. It is correct but looks wrong, or b. It is incorrect, but I had to leave it that was for a reason. The Flickr example is in the a. category.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close