Browse Definitions:

Quizzes

  • Quiz: Top 10 consumer threats

    Test yourself. A WhatIs.com tech vocabulary quiz about consumer threats teminology.

  • Quiz: Looney Tunes

    A tech trivia quiz with a Looney-Toons theme: What starring character's first name is also a term for pesky coding errors?

  • Quiz: Linux Basics

    A quiz about Linux terms: What company hopes to attract Windows expatriots by promoting an easy way for the average desktop user to migrate to Linux?

  • Quiz: Laptops

    A quiz about laptop computers: This technology is used in the liquid crystal displays of notebook and laptop computers to provide a more responsive image at a wider range of viewing angle.

  • Quiz: IT's Greek to me!

    A quiz about tech terms derived from Greek: If you think your computer has a mean streak, you're exhibiting this, the tendency to think of non-humans as having human characteristics. The term comes from the Greek words for human and shape.

  • Quiz: IT's about time!

    A quiz about time: Our current calendar system was instituted by Pope Gregory XIII, back in 1582. Who instituted the Julian calendar?

  • Quiz: IT Potpourri

    IT trivia quiz: According to recent reports, Microsoft and Intel are conspiring on a device that will crush a popular handheld device with a fruity name. What is it?

  • Quiz: IT lives!

    A quiz about inventors and innovators in information technology: This hugely successful organization began life in 1996 as an application called 'Backrub.' (Hint: It was created by Larry Page and Sergey Brin, then two graduate students at Stanford University.) What is it?

  • Quiz: Intrusion prevention fundamentals

    A quiz about intrusion prevention: What describes any attack strategy where the attacker purposely makes it confusing and difficult for interested parties to figure out who initiated the attack.

  • Quiz: Integrated threat management

    A quiz about integrated threat management. How much did malware attacks increase in 2005: 32, 48 or 75 percent? Or did they actually decrease?

  • Quiz: In the Spammer's Lair

    A quiz about spammer techniques: What is a program that automatically trolls the Internet for email addresses.

  • Quiz: IM lingo 4U

    Test yourself. A WhatIs.com vocabulary quiz about instant messaging.

  • Quiz: HP

    A quiz about Hewlett-Packard technologies: What is a software suite from HP for managing applications, device availability, network conditions and status, system performance, service and program maintenance, and storage resources.

  • Quiz: Halloween IV: Can you shriek Geek?

    Halloween-themed tech quiz: Ugh! This scourge of the Internet gets its name from a Latin word meaning slimy liquid or poison.

  • Quiz: Greening the cube farm

    A quiz about environmentally-friendly computing practices: What innovative technology powers laptops from the One Laptop Per Child foundation?

  • Quiz: Getting Your Message Across the Network

    A quiz about data transmission: Suppose you want to send an e-mail note to someone on the Internet. Which of these do you NOT need: a browser, an Internet service provider, the at sign or an address?

  • Quiz: For Latin Lovers

    A tech trivia quiz featuring Latin-derived terms: What does quid pro quo mean?

  • Quiz: Firewalls

    A quiz about firewalls: A server that acts as this kind of node often also acts as a proxy server and a firewall server.

  • Quiz: Ethernet

    A quiz about Ethernet: What happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time?

  • Quiz: Ego-Booster

    A tech terminology quiz: This is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

  • Quiz: E-business trends and technologies

    A quiz about e-business: This Web site feature involves tailoring pages to individual users' characteristics or preferences.

  • Quiz: Do you speak Geek, Greek, or Elvish?

    A tech quiz with a ancient Greece/Lord of the Rings theme: Which of the following conveys malicious or harmful code concealed within harmless programming? (Hint: It was used by the Greeks, as told in the Aeneid.)

  • Quiz: Do you speak Geek during the holidays?

    A quiz featuring IT terms related to the holidays: If Saint Nick ate them all in one night, he might need extra RP (reindeer power) to get that sleigh airborne! On the Internet, it's a small text file a Web server sends to your browser...

  • Quiz: Do you eat Geek?

    A tech quiz with a food-oriented theme: If you're a geek eating Mexican, you might be confused about asking for a mole sauce. Instead of chocolate-based sauce, you might get a mole of sauce. How much would that be?

  • Quiz: Database II

    A quiz about databases: At this level of normalization, each column in a table that is not a determiner of the contents of another column, must itself be a function of the other columns in the table. What is it?

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close