Browse Definitions :
Quiz

Quiz: Star Trek Tech

Is Klingon your second language? Do you organize your blog by stardate? Feel nervous in red shirts? If you answered "Affirmative" to these questions, you might be a Trekkie. Even if you aren't, you probably know more than you'd think about the technologies featured on this venerable series. Take our geek quiz to test your Star Trek Tech quotient. Live long and prosper!

1. JlSuDrup? This search engine offers a Klingon interface. What is it?
Answer

2. Star Trek III, The Search for Spock: Beset by Klingons, the crew is forced to destroy this. In common parlance, it's a term for any type of organization that uses computers in its day-to-day operations. What is it?
Answer

3. This super high-tech method is used to transport humans and more exotic life forms between the Enterprise and other locales. On the home planet, the term refers to a means of transferring data between two devices using infrared transmission. What is it?
Answer

4. Romulans and Klingons alike have used this type of device to shield ships from detection; spammers use it to mask their names and addresses in mass mailings. What is it?
Answer

5. Here's Star Trek's recipe for the power required to achieve warp speed: simply combine this type of substance in equal proportions with matter, for a direct and complete conversion to energy. What is it?
Answer

6. Party on the holodeck! Introduced in STTNG (Star Trek, The Next Generation), the holodeck is an extremely sophisticated and interactive version of this environment-simulation technology. What is it?
Answer

7. Spock employed the Vulcan nerve pinch to put foes out of commission. In computing, the Vulcan nerve pinch is another name for a famous three-key combination frequently used to shut down a hanging system. What is it?
Answer

8. On Star Trek, if your ship got too close to one of these, the odds were it would get sucked right into it. In physics and astronomy, it's a region in time and space within which gravity is so strong that nothing can escape. What is it?
Answer

9. Dr. McCoy implants these devices into Kirk and Spock, for tracking purposes, before they beam down to the planet Ekos. It's a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal. What is it?
Answer

10. This handy Iconian transporter enables instantaneous travel to anywhere in existence; in communications it's a point on a network that serves as an entrance to another network. What is it?
Answer

How many could you guess correctly without peeking? Let us know!
Want more? Click here to boldly go where ... we keep the rest of our quizzes.

This was last updated in August 2009

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

Close