Browse Definitions :
Quiz

Quiz: Presence Technology

This week's quiz has a slightly different format. Your goal will beto match the correct term in the left-hand column with its descriptionin the right-hand column.

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you ve chosenis correct, you will see the question text somewhere in the defintion.
OR
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

a) session initiation protocol

b) ICQ

c) display modes

d) Lightweight Directory Access Protocol

e) synchronous

f) Winsock

g) presence technology

h) Sarbanes-Oxley

i) Jabber

j) Transmission Control Protocol

k) ping

l) Transport Layer Security

m) multiplexing

n) IM worm

o) Short Message Service

p) group chat

q) encryption

r) asynchronous

s) Server Message Block Protocol

t) interoperability

u) nanosecond

v) normalization

w) mobile IP

x) Bluetooth

y) Secure Sockets Layer

z) Transport Layer Security

1._____ This is an initiative toproduce an open source, XML-based instant messaging platform.

2. _____ This describes any kind of application that makes it possible to locate and identify acomputing device wherever it might be, as soon as the user connects to thenetwork.

3._____ This legislation that impacts instant messaging in the enterprise was enacted in response to the high-profile Enron and WorldCom financial scandals.

4._____ This is a service for sending text messages to mobile phones that use Global System for Mobile (GSM) communication.

5. _____ This is an adjective describing objects or events that are not coordinated in time and do not occur simultaneously.

6. _____ This is the ability of a system or a product to work with other systems or products without special effort on the part of the customer.

7._____ This is self-replicating malicious code that spreads in instant messaging networks.

8._____ This is a cost-effective way for several users to conduct a virtual meeting in real time by using instant messaging.

9._____ This synonym for "real time" is used to describe an application that updates information at the same rate it receives data.

10._____ This is a software protocol for enabling anyone to locate individuals and other resources, such as files and devices in a network, whether on the public Internet or on a corporate intranet.


SCROLL DOWN FOR ANSWER KEY







See the rest of our quiz topics

ANSWER KEY: 1i; 2g; 3h; 4o; 5r; 6t; 7n; 8p; 9e; 10d

This was last updated in July 2008

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

Close