Browse Definitions :
Quiz

Quizzes

TABLE OF CONTENTS


 Backup and Recovery
  • Backup and Recovery
  • Backup School I
  • Backup School II
  • iSeries Backup and Recovery Commands
  • iSeries Word Scramble: Backup & Recovery

 

  Business Intelligence

 

   Compliance
  • Compliance
  • Compliance II: The letter of the law
  • Regulatory compliance

 

   Computing Fundamentals
  • CICS History Quiz
  • Computer Trivia #1
  • Computer Trivia #2
  • Computer Nostalgia
  • Computer Nostalgia 2.0
  • Do you speak Geek? A Vital Video Quiz
  • File Extensions
  • ESA, XI and the new era of integration
  • Help Desk Basics
  • IT Vocabulary
  • Laptops
  • Logic Chips
  • Know-IT-All Admin Challenge: The Sequel
  • Name my claim to fame!
  • Performance Tuning
  • Peripherals
  • Processing Power
  • Ruling Your IT Universe
  • Short & Sweet!
  • Troubleshooting Microsoft Technologies
  • Workstations

 

  CRM

 

 

   Data Management

 

   Databases

 

   Hardware

 

   Internet

 

   iSeries
  • AS/400
  • iSeries Commands
  • iSeries Trivia
  • Who's Who in the iSeries World
  • Who's Who in the iSeries World II

 

  Learning and Careers

 

   Messaging and E-mail
  • Email Marketing and the Spam Problem
  • Email Security
  • Exchange Geek-o-Meter
  • RU IM Savvy?
  • Spam, Spam and More Spam
  • Writing for Business

 

   Miscellaneous
  • A Taste For Tech
  • Acronym-o-phobia
  • Artificial Intelligence
  • Do you eat Geek?
  • Do you speak Geek: Believe IT or Not!
  • Do you speak Geek: Are you an IT-know-it-all?
  • Do you speak Geek during the holidays?
  • Do you speak Geek, Greek, or Elvish?
  • Do you speak Geek with the Simpsons?
  • Down the chimney, through the firewall: Holiday quiz
  • Ego Booster
  • Famous People in IT
  • Fear of Nanopants and Other Scary Technologies
  • Great Geeks in History
  • Halloween: Do you speak Geek?
  • Halloween II: Do you speak -- EEK! -- Geek?
  • Halloween III: Tech or Treat!
  • IM Lingo 4U
  • IT's About Taxes
  • IT's About Time!
  • IT's For Latin Lovers
  • IT Lives! Enter the Geekosphere!
  • IT Potpourri
  • Looney Tunes
  • Major IT Players: How'd They Start Out?
  • Romancing the Geek
  • Offshore Outsourcing
  • SHARE celebrates its 50th
  • Star Trek Tech: Do you speak Geek?
  • Star Wars Tech, Then and Now
  • Thanksgiving: Talkin' Tech Turkey
  • The Robots are Coming!
  • Top Tech Picks for 2006
  • Weird and Wonderful Geekspeak
  • What the Dickens?
  • Who Done IT? A Murder Mystery
  • What kind of geek are you?
  • Winter Blues

 

   Networking

 

   Open Source
  • Linux Basics
  • March of the Penguin
  • More Fun with Open Source
  • Open and Shut
  • Romancing the Penguin
  • Romancing the Penguin II: The Lovers
  • Romancing the Penguin III: Raiders of the Lost OS
  • Romancing the Penguin IV: Temple of Doom
  • Samba Server Types & Security Modes

 

   Operating Systems
  • IIS 6 Administration
  • Linux Basics for Windows Pro
  • Linux and Open Source-friendly Databases
  • Linux Security
  • Linux Tools
  • Linux, Windows Migration & Interoperability
  • Windows Geek-o-Meter

 

   Programming

 

   SAP

 

   Security

 

 

   Storage
  • Top 10 hot storage technologies
  • Database Basics
  • Data Storage
  • Data Storage Hardware
  • Disk Jockey
  • Greening the Cube Farm
  • Improve your Memory!
  • IP Storage
  • Network-Attached Storage
  • RAID
  • SAN: Do you speak Geek?
  • Storage Area Networks
  • Storage Basics
  • Storage Networking
  • Storage Management Survival School
  • Storage Management II
  • Storage Smarts
  • Tape
  • Test Your IQ: Business Continuity
  • Top 25 Data Storage Terms

 

   Virtualization

 

   VoIP
  • Hip to SIP
  • Voice over IP
  • VoIP Call Center

 

   Wireless & Mobile
This was last updated in August 2009
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close