-
web.groovymark@gmail.com
- November 27, 2024
Question 21
Which type of memory is faster than RAM but with limited storage capacity?
a) Cache memory
b) Virtual memory
c) Disk storage
d) Solid State Drive (SSD)
Correct Answer: a) Cache memory
Explanation: Cache memory is faster than RAM but has less storage capacity. It stores frequently accessed data to speed up processing.
Question 22
Which part of a computer system holds the data temporarily while it is being processed?
a) Hard Drive
b) Cache
c) RAM
d) CPU
Correct Answer: c) RAM
Explanation: RAM holds data temporarily while it is being processed by the CPU, providing quick access for the current tasks.
Question 23
What is the name for a private network that operates like the internet but is confined within an organization?
a) Extranet
b) VPN
c) Intranet
d) LAN
Correct Answer: c) Intranet
Explanation: An intranet is a private network used within an organization, often to share company information securely.
Question 24
Which process refers to removing redundant data from a database?
a) Data mining
b) Indexing
c) Normalization
d) Defragmentation
Correct Answer: c) Normalization
Explanation: Normalization removes redundant data in a database to improve efficiency and prevent duplication.
Question 25
What is the term for a criminal activity where an individual deceives others into providing personal information by posing as a legitimate business?
a) Spamming
b) Phishing
c) Keylogging
d) Adware
Correct Answer: b) Phishing
Explanation: Phishing involves deceiving individuals into providing personal information, such as passwords or credit card numbers, by posing as a legitimate entity.
Question 26
Which device is responsible for routing traffic between different networks?
a) Hub
b) Switch
c) Router
d) NIC
Correct Answer: c) Router
Explanation: Routers connect multiple networks and route data between them, directing traffic based on destination IP addresses.
Question 27
Which type of network connects computers over a short distance, such as within a building?
a) Wide Area Network (WAN)
b) Local Area Network (LAN)
c) Campus Area Network (CAN)
d) Metropolitan Area Network (MAN)
Correct Answer: b) Local Area Network (LAN)
Explanation: A LAN connects computers in a localized area, like a building or a campus, and allows devices to communicate within that network.
Question 28
Which storage device is non-volatile and uses a read/write apparatus to store data?
a) RAM
b) Hard Drive
c) Cache
d) Virtual Memory
Correct Answer: b) Hard Drive
Explanation: Hard drives are non-volatile storage devices that store data persistently using a read/write mechanism.
Question 29
Which of the following is an example of system software?
a) Microsoft Word
b) Windows 10
c) Adobe Photoshop
d) Google Chrome
Correct Answer: b) Windows 10
Explanation: Windows 10 is an operating system, a type of system software that manages the hardware and software of a computer.
Question 30
Which network topology connects all devices through a central node, but if the central node fails, the entire network goes down?
a) Ring topology
b) Star topology
c) Bus topology
d) Mesh topology
Correct Answer: b) Star topology
Explanation: In a star topology, all devices are connected to a central node (such as a hub or switch). If the central node fails, the entire network is disrupted.
Question 31
Which law states that computing processing power doubles approximately every 18 months?
a) Murphy’s Law
b) Newton’s Law
c) Moore’s Law
d) Ohm’s Law
Correct Answer: c) Moore’s Law
Explanation: Moore’s Law predicts that the number of transistors on microchips will double every 18 months, effectively doubling computing power.
Question 32
Which of the following terms refers to a software designed to perform malicious actions without user consent?
a) Phishing
b) Spyware
c) Malware
d) Trojan Horse
Correct Answer: c) Malware
Explanation: Malware refers to any software designed to damage, disrupt, or gain unauthorized access to computer systems.
Question 33
Which of the following represents the physical parts of a computer system?
a) Software
b) Hardware
c) Firmware
d) Network Protocol
Correct Answer: b) Hardware
Explanation: Hardware consists of the physical components of a computer, such as the CPU, motherboard, and hard drive.
Question 34
Which of the following devices uses light to read and write data?
a) Hard Drive
b) Optical Disk
c) RAM
d) Solid State Drive
Correct Answer: b) Optical Disk
Explanation: Optical disks, like CDs and DVDs, use laser technology to read and write data.
Question 35
Which data storage device provides faster data access compared to traditional hard drives because it has no moving parts?
a) Solid State Drive (SSD)
b) Optical Disk
c) Hard Disk Drive (HDD)
d) RAM
Correct Answer: a) Solid State Drive (SSD)
Explanation: SSDs provide faster access to data compared to HDDs because they use flash memory with no moving parts.
Question 36
Which term refers to a process that examines large sets of data to identify patterns and trends?
a) Data Normalization
b) Data Mining
c) Data Fragmentation
d) Data Governance
Correct Answer: b) Data Mining
Explanation: Data mining involves analyzing large data sets to find patterns, trends, and useful insights.
Question 37
Which of the following components allows devices to be uniquely identified within a network?
a) MAC address
b) IP address
c) Firewall
d) Router
Correct Answer: a) MAC address
Explanation: A Media Access Control (MAC) address is a unique identifier assigned to a network interface card (NIC), which allows devices to be identified on a network.
Question 38
Which protocol is most commonly used for securing communication over the internet?
a) HTTP
b) FTP
c) HTTPS
d) DNS
Correct Answer: c) HTTPS
Explanation: HTTPS is the secure version of HTTP and is used for secure communication over the internet, particularly for online transactions.
Question 39
Which network device is responsible for directing packets of data between different networks?
a) Switch
b) Router
c) Hub
d) Bridge
Correct Answer: b) Router
Explanation: Routers direct data packets between different networks, using IP addresses to determine the best path for the data to travel.
Question 40
Which term refers to a criminal activity where a perpetrator logs every keystroke made by a user to steal sensitive information?
a) Spamming
b) Phishing
c) Keylogging
d) Trojan Horse
Correct Answer: c) Keylogging
Explanation: Keylogging involves recording keystrokes made on a computer to steal sensitive information like passwords or credit card numbers.