Browse Definitions:

Quizzes

  • Quiz: IT lives!

    A quiz about inventors and innovators in information technology: This hugely successful organization began life in 1996 as an application called 'Backrub.' (Hint: It was created by Larry Page and Sergey Brin, then two graduate students at Stanford University.) What is it?

  • Quiz: Intrusion prevention fundamentals

    A quiz about intrusion prevention: What describes any attack strategy where the attacker purposely makes it confusing and difficult for interested parties to figure out who initiated the attack.

  • Quiz: Integrated threat management

    A quiz about integrated threat management. How much did malware attacks increase in 2005: 32, 48 or 75 percent? Or did they actually decrease?

  • Quiz: In the Spammer's Lair

    A quiz about spammer techniques: What is a program that automatically trolls the Internet for email addresses.

  • Quiz: IM lingo 4U

    Test yourself. A WhatIs.com vocabulary quiz about instant messaging.

  • Quiz: HP

    A quiz about Hewlett-Packard technologies: What is a software suite from HP for managing applications, device availability, network conditions and status, system performance, service and program maintenance, and storage resources.

  • Quiz: Halloween IV: Can you shriek Geek?

    Halloween-themed tech quiz: Ugh! This scourge of the Internet gets its name from a Latin word meaning slimy liquid or poison.

  • Quiz: Greening the cube farm

    A quiz about environmentally-friendly computing practices: What innovative technology powers laptops from the One Laptop Per Child foundation?

  • Quiz: Getting Your Message Across the Network

    A quiz about data transmission: Suppose you want to send an e-mail note to someone on the Internet. Which of these do you NOT need: a browser, an Internet service provider, the at sign or an address?

  • Quiz: For Latin Lovers

    A tech trivia quiz featuring Latin-derived terms: What does quid pro quo mean?

  • Quiz: Firewalls

    A quiz about firewalls: A server that acts as this kind of node often also acts as a proxy server and a firewall server.

  • Quiz: Ethernet

    A quiz about Ethernet: What happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time?

  • Quiz: Ego-Booster

    A tech terminology quiz: This is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

  • Quiz: E-business trends and technologies

    A quiz about e-business: This Web site feature involves tailoring pages to individual users' characteristics or preferences.

  • Quiz: Do you speak Geek, Greek, or Elvish?

    A tech quiz with a ancient Greece/Lord of the Rings theme: Which of the following conveys malicious or harmful code concealed within harmless programming? (Hint: It was used by the Greeks, as told in the Aeneid.)

  • Quiz: Do you speak Geek during the holidays?

    A quiz featuring IT terms related to the holidays: If Saint Nick ate them all in one night, he might need extra RP (reindeer power) to get that sleigh airborne! On the Internet, it's a small text file a Web server sends to your browser...

  • Quiz: Do you eat Geek?

    A tech quiz with a food-oriented theme: If you're a geek eating Mexican, you might be confused about asking for a mole sauce. Instead of chocolate-based sauce, you might get a mole of sauce. How much would that be?

  • Quiz: Database II

    A quiz about databases: At this level of normalization, each column in a table that is not a determiner of the contents of another column, must itself be a function of the other columns in the table. What is it?

  • Quiz: Computer Nostalgia 2.0

    A computer history quiz: In 1982, young Richard Skrenta secured his place in computer history by creating a program called Elk Cloner. What made Skrenta's program noteworthy?

  • Quiz: Compliance

    A quiz about compliance: What's the job title of the corporate official in charge of overseeing and managing compliance issues?

  • Quiz: Common Vulnerabilities

    A quiz about security vulnerabilities: An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.

  • Quiz: Business Intelligence

    A business intelligence tech quiz: What is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.

  • Quiz: Believe it or Not: Do you speak Geek?

    An April Fools tech quiz: The first computer ever designed, called the Difference Engine, was powered by a wind-up crank on the side. True or false?

  • Quiz: A taste for tech?

    A quiz about food-related tech terms: Does this prominent producer of hardware and software keep the doctor away?

  • Quiz: 10 hot green terms to keep you (and the planet) cool

    A quiz on green technology: This term describes surfing search engine results using an inverted palette, with white text on a black body, saving monitor wattage in the process. What is it?

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SAS SSD (Serial-Attached SCSI solid-state drive)

    A SAS SSD (Serial-Attached SCSI solid-state drive) is a NAND flash-based storage or caching device designed to fit in the same ...

  • MTTR (mean time to repair)

    MTTR (mean time to repair) is the average time required to fix a failed component or device and return it to production status.

  • OpenStack Swift

    OpenStack Swift, also known as OpenStack Object Storage, is an open source object storage system that is licensed under the ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close