Browse Definitions:

Quizzes

  • Ajax quiz: Do you speak Geek?

    A quiz about AJAX. What combination of technologies gives Ajax its name? Test yourself.

  • Software Piracy Quiz

    How much do you know about the finer points of software piracy? Take our quiz to find out.

  • What do you know about the iPhone 3G?

    A quiz about the iPhone 3G: What technology does the 3G service use?

  • Quiz: Top 10 consumer threats

    Test yourself. A WhatIs.com tech vocabulary quiz about consumer threats teminology.

  • Quiz: Looney Tunes

    A tech trivia quiz with a Looney-Toons theme: What starring character's first name is also a term for pesky coding errors?

  • Quiz: Linux Basics

    A quiz about Linux terms: What company hopes to attract Windows expatriots by promoting an easy way for the average desktop user to migrate to Linux?

  • Quiz: Laptops

    A quiz about laptop computers: This technology is used in the liquid crystal displays of notebook and laptop computers to provide a more responsive image at a wider range of viewing angle.

  • Quiz: IT's Greek to me!

    A quiz about tech terms derived from Greek: If you think your computer has a mean streak, you're exhibiting this, the tendency to think of non-humans as having human characteristics. The term comes from the Greek words for human and shape.

  • Quiz: IT's about time!

    A quiz about time: Our current calendar system was instituted by Pope Gregory XIII, back in 1582. Who instituted the Julian calendar?

  • Quiz: IT Potpourri

    IT trivia quiz: According to recent reports, Microsoft and Intel are conspiring on a device that will crush a popular handheld device with a fruity name. What is it?

  • Quiz: IT lives!

    A quiz about inventors and innovators in information technology: This hugely successful organization began life in 1996 as an application called 'Backrub.' (Hint: It was created by Larry Page and Sergey Brin, then two graduate students at Stanford University.) What is it?

  • Quiz: Intrusion prevention fundamentals

    A quiz about intrusion prevention: What describes any attack strategy where the attacker purposely makes it confusing and difficult for interested parties to figure out who initiated the attack.

  • Quiz: Integrated threat management

    A quiz about integrated threat management. How much did malware attacks increase in 2005: 32, 48 or 75 percent? Or did they actually decrease?

  • Quiz: In the Spammer's Lair

    A quiz about spammer techniques: What is a program that automatically trolls the Internet for email addresses.

  • Quiz: IM lingo 4U

    Test yourself. A WhatIs.com vocabulary quiz about instant messaging.

  • Quiz: HP

    A quiz about Hewlett-Packard technologies: What is a software suite from HP for managing applications, device availability, network conditions and status, system performance, service and program maintenance, and storage resources.

  • Quiz: Halloween IV: Can you shriek Geek?

    Halloween-themed tech quiz: Ugh! This scourge of the Internet gets its name from a Latin word meaning slimy liquid or poison.

  • Quiz: Greening the cube farm

    A quiz about environmentally-friendly computing practices: What innovative technology powers laptops from the One Laptop Per Child foundation?

  • Quiz: Getting Your Message Across the Network

    A quiz about data transmission: Suppose you want to send an e-mail note to someone on the Internet. Which of these do you NOT need: a browser, an Internet service provider, the at sign or an address?

  • Quiz: For Latin Lovers

    A tech trivia quiz featuring Latin-derived terms: What does quid pro quo mean?

  • Quiz: Firewalls

    A quiz about firewalls: A server that acts as this kind of node often also acts as a proxy server and a firewall server.

  • Quiz: Ethernet

    A quiz about Ethernet: What happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time?

  • Quiz: Ego-Booster

    A tech terminology quiz: This is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

  • Quiz: E-business trends and technologies

    A quiz about e-business: This Web site feature involves tailoring pages to individual users' characteristics or preferences.

  • Quiz: Do you speak Geek, Greek, or Elvish?

    A tech quiz with a ancient Greece/Lord of the Rings theme: Which of the following conveys malicious or harmful code concealed within harmless programming? (Hint: It was used by the Greeks, as told in the Aeneid.)

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close