- web.groovymark@gmail.com
- November 28, 2024
Question 21
Which encryption method uses the same key for both encryption and decryption?
A) Public Key Encryption
B) Symmetric Key Encryption
C) Asymmetric Key Encryption
D) Digital Signature
Correct Answer: B) Symmetric Key Encryption
Explanation: In symmetric key encryption, the same key is used for both encrypting and decrypting the data, requiring secure key distribution between parties.
Question 22
Which of the following defines a primary key in a relational database?
A) A unique identifier for each record
B) A key used for encryption
C) A key that links two tables
D) A temporary placeholder for value
Correct Answer: A) A unique identifier for each record
Explanation: The primary key is a unique identifier for each record in a relational database, ensuring that no two records have the same key value.
Question 23
What does ETL stand for in data processing?
A) Extract, Transform, Load
B) Encrypt, Transmit, Load
C) Evaluate, Test, Launch
D) Export, Translate, Log
Correct Answer: A) Extract, Transform, Load
Explanation: ETL stands for Extract, Transform, Load, and it refers to the process of extracting data from sources, transforming it for analysis, and loading it into a final destination.
Question 24
Which network topology connects all devices to a central hub or switch?
A) Bus
B) Star
C) Ring
D) Mesh
Correct Answer: B) Star
Explanation: In a star topology, all devices are connected to a central hub or switch, and communication passes through the central point.
Question 25
What is the function of a database query?
A) Modify data records
B) Retrieve specific information based on criteria
C) Organize data in a database
D) Monitor network traffic
Correct Answer: B) Retrieve specific information based on criteria
Explanation: A database query is used to retrieve specific information from a database, often by applying filters or conditions to the data.
Question 26
Which of the following describes the purpose of RAID (Redundant Array of Independent Disks)?
A) Increase network bandwidth
B) Manage hardware resources
C) Improve data redundancy and performance
D) Encrypt sensitive data
Correct Answer: C) Improve data redundancy and performance
Explanation: RAID is a technology used to improve data redundancy and performance by distributing data across multiple disk drives.
Question 27
Which method of risk management involves reducing the likelihood or impact of a risk?
A) Risk Acceptance
B) Risk Transference
C) Risk Mitigation
D) Risk Avoidance
Correct Answer: C) Risk Mitigation
Explanation: Risk mitigation involves taking steps to reduce the likelihood or impact of a risk, such as by implementing security measures or developing contingency plans.
Question 28
Which type of programming language is designed to be human-readable and is converted into machine code through a compiler or interpreter?
A) Assembly Language
B) Low-level Language
C) High-level Language
D) Machine Language
Correct Answer: C) High-level Language
Explanation: High-level programming languages are designed to be human-readable, using abstract concepts that are converted into machine code by compilers or interpreters.
Question 29
What is the primary function of the CPU (Central Processing Unit) in a computer system?
A) Store data for long-term use
B) Execute instructions and process data
C) Manage input and output devices
D) Handle network communication
Correct Answer: B) Execute instructions and process data
Explanation: The CPU is the "brain" of the computer, responsible for executing instructions and processing data.
Question 30
Which project management phase involves officially closing the project and delivering the final product?
A) Planning
B) Execution
C) Closing
D) Controlling
Correct Answer: C) Closing
Explanation: The closing phase involves formally ending the project, delivering the final product to the client, and completing any necessary documentation.
Question 31
Which backup type stores only the data that has changed since the last full backup, without referencing other backup types?
A) Full Backup
B) Differential Backup
C) Incremental Backup
D) Continuous Backup
Correct Answer: B) Differential Backup
Explanation: A differential backup captures only the data that has changed since the last full backup, providing a faster recovery time than incremental backups.
Question 32
Which component of the operating system is loaded when the computer first starts up and remains in memory to manage system resources?
A) Shell
B) Kernel
C) Device Driver
D) Bootloader
Correct Answer: B) Kernel
Explanation: The kernel is the core part of the operating system that manages system resources, and it remains in memory after the computer starts up.
Question 33
What does the acronym ROM stand for in computing?
A) Random Output Memory
B) Read-Only Memory
C) Real Operating Mode
D) Random Access Memory
Correct Answer: B) Read-Only Memory
Explanation: ROM (Read-Only Memory) is non-volatile memory used to store firmware and other data that does not change frequently.
Question 34
Which cloud computing model focuses on delivering virtual desktops to users over the internet?
A) SaaS
B) DaaS
C) IaaS
D) PaaS
Correct Answer: B) DaaS
Explanation: Desktop as a Service (DaaS) delivers virtual desktops to users, allowing them to access a complete desktop environment over the internet.
Question 35
Which security measure ensures that data is correct and has not been altered?
A) Confidentiality
B) Availability
C) Integrity
D) Encryption
Correct Answer: C) Integrity
Explanation: Data integrity ensures that information remains accurate and unaltered during transmission or storage, ensuring it is reliable and trustworthy.
Question 36
. Which SQL keyword is used to update existing records in a database table?
A) INSERT
B) DELETE
C) UPDATE
D) SELECT
Correct Answer: C) UPDATE
Explanation: The UPDATE command in SQL is used to modify existing records in a table, allowing changes to be made to the data.
Question 37
What is the primary function of a print server?
A) Manage print jobs on a network
B) Store backup files
C) Encrypt print data
D) Process database queries
Correct Answer: A) Manage print jobs on a network
Explanation: A print server manages and monitors print jobs on a network, allowing multiple users to send documents to shared printers.
Question 38
Which risk management strategy involves accepting the consequences of a risk without taking action to reduce its likelihood or impact?
A) Risk Mitigation
B) Risk Avoidance
C) Risk Acceptance
D) Risk Transference
Correct Answer: C) Risk Acceptance
Explanation: Risk acceptance involves acknowledging the risk and choosing not to take any preventive measures, accepting the consequences if the risk occurs.
Question 39
Which network device is used to connect multiple networks together, directing data based on IP addresses?
A) Switch
B) Hub
C) Router
D) Bridge
Correct Answer: C) Router
Explanation: A router is used to connect different networks together and direct data traffic between them based on IP addresses.
Question 40
Which of the following describes a virtual machine (VM)?
A) A physical computer dedicated to running multiple operating systems
B) A program that allows multiple operating systems to run on a single physical machine
C) A network protocol used to connect remote devices
D) A method of encrypting data before transmission
Correct Answer: B) A program that allows multiple operating systems to run on a single physical machine
Explanation: A virtual machine (VM) allows multiple operating systems to run simultaneously on a single physical machine by simulating separate environments.