Browse Definitions:

Quizzes

Internet technologies

  • Internet Quizzes

    We've gathered a collection of our quizzes on Internet-related topics. You'll find quizzes about spam, security, Web services, SEO and more.

  • VoIP security threats

    As VoIP becomes increasingly prevalent, so do the threats aimed at subverting its security. Hackers are developing new methods of attack and finding new ways to use established methods. How much do you know about the threats to VoIP security? Take our quiz to find out.

  • Modes of Attack

    Test yourself. A WhatIs.com tech vocabulary quiz about online security attacks and current attack methods. Test yourself.

  • Streaming media quiz

    A quiz about technologies and terms related to streaming media. How does streaming media work?

  • Quiz: TCP/IP

    Test yourself. A WhatIs.com tech vocabulary quiz about TCP/IP teminology.

  • Ajax quiz: Do you speak Geek?

    A quiz about AJAX. What combination of technologies gives Ajax its name? Test yourself.

  • Do you speak Geek? A Vital Video Quiz

    Test yourself. A WhatIs.com tech vocabulary quiz about video. In video, this is a reduction in data size to save disk space or transmission time.

  • Do You Speak Geek: Famous People in IT Quiz

    Test yourself. This is a quiz on famous people in IT. Although I invented CTRL-ALT-DELETE, I like to joke that Microsoft made it famous. Who am I?

  • Quiz: Web Management Basics

    How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the whatis definition

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close