OA Exams

  • web.groovymark@gmail.com
  • November 27, 2024

Question 21

Which type of memory is faster than RAM but with limited storage capacity?

a) Cache memory

b) Virtual memory

c) Disk storage

d) Solid State Drive (SSD)

Correct Answer: a) Cache memory

Explanation: Cache memory is faster than RAM but has less storage capacity. It stores frequently accessed data to speed up processing.

Question 22

Which part of a computer system holds the data temporarily while it is being processed?

a) Hard Drive

b) Cache

c) RAM

d) CPU

Correct Answer: c) RAM

Explanation: RAM holds data temporarily while it is being processed by the CPU, providing quick access for the current tasks.

Question 23

What is the name for a private network that operates like the internet but is confined within an organization?

a) Extranet

b) VPN

c) Intranet

d) LAN

Correct Answer: c) Intranet

Explanation: An intranet is a private network used within an organization, often to share company information securely.

Question 24

Which process refers to removing redundant data from a database?

a) Data mining
b) Indexing
c) Normalization
d) Defragmentation

Correct Answer: c) Normalization

Explanation: Normalization removes redundant data in a database to improve efficiency and prevent duplication.

Question 25

What is the term for a criminal activity where an individual deceives others into providing personal information by posing as a legitimate business?

a) Spamming
b) Phishing
c) Keylogging
d) Adware

Correct Answer: b) Phishing

Explanation: Phishing involves deceiving individuals into providing personal information, such as passwords or credit card numbers, by posing as a legitimate entity.

Question 26

Which device is responsible for routing traffic between different networks?

a) Hub
b) Switch
c) Router
d) NIC

Correct Answer: c) Router

Explanation: Routers connect multiple networks and route data between them, directing traffic based on destination IP addresses.

Question 27

Which type of network connects computers over a short distance, such as within a building?

a) Wide Area Network (WAN)
b) Local Area Network (LAN)
c) Campus Area Network (CAN)
d) Metropolitan Area Network (MAN)

Correct Answer: b) Local Area Network (LAN)

Explanation: A LAN connects computers in a localized area, like a building or a campus, and allows devices to communicate within that network.

Question 28

Which storage device is non-volatile and uses a read/write apparatus to store data?

a) RAM

b) Hard Drive

c) Cache

d) Virtual Memory

Correct Answer: b) Hard Drive

Explanation: Hard drives are non-volatile storage devices that store data persistently using a read/write mechanism.

Question 29

Which of the following is an example of system software?

a) Microsoft Word
b) Windows 10
c) Adobe Photoshop
d) Google Chrome

Correct Answer: b) Windows 10

Explanation: Windows 10 is an operating system, a type of system software that manages the hardware and software of a computer.

Question 30

Which network topology connects all devices through a central node, but if the central node fails, the entire network goes down?

a) Ring topology

b) Star topology

c) Bus topology

d) Mesh topology

Correct Answer: b) Star topology

Explanation: In a star topology, all devices are connected to a central node (such as a hub or switch). If the central node fails, the entire network is disrupted.

Question 31

Which law states that computing processing power doubles approximately every 18 months?

a) Murphy’s Law

b) Newton’s Law

c) Moore’s Law

d) Ohm’s Law

Correct Answer: c) Moore’s Law

Explanation: Moore’s Law predicts that the number of transistors on microchips will double every 18 months, effectively doubling computing power.

Question 32

Which of the following terms refers to a software designed to perform malicious actions without user consent?

a) Phishing

b) Spyware

c) Malware

d) Trojan Horse

Correct Answer: c) Malware

Explanation: Malware refers to any software designed to damage, disrupt, or gain unauthorized access to computer systems.

Question 33

Which of the following represents the physical parts of a computer system?

a) Software

b) Hardware

c) Firmware

d) Network Protocol

Correct Answer: b) Hardware

Explanation: Hardware consists of the physical components of a computer, such as the CPU, motherboard, and hard drive.

Question 34

Which of the following devices uses light to read and write data?

a) Hard Drive
b) Optical Disk
c) RAM
d) Solid State Drive

Correct Answer: b) Optical Disk

Explanation: Optical disks, like CDs and DVDs, use laser technology to read and write data.

Question 35

Which data storage device provides faster data access compared to traditional hard drives because it has no moving parts?

a) Solid State Drive (SSD)
b) Optical Disk
c) Hard Disk Drive (HDD)
d) RAM

Correct Answer: a) Solid State Drive (SSD)

Explanation: SSDs provide faster access to data compared to HDDs because they use flash memory with no moving parts.

Question 36

Which term refers to a process that examines large sets of data to identify patterns and trends?

a) Data Normalization
b) Data Mining
c) Data Fragmentation
d) Data Governance

Correct Answer: b) Data Mining

Explanation: Data mining involves analyzing large data sets to find patterns, trends, and useful insights.

Question 37

Which of the following components allows devices to be uniquely identified within a network?

a) MAC address
b) IP address
c) Firewall
d) Router

Correct Answer: a) MAC address

Explanation: A Media Access Control (MAC) address is a unique identifier assigned to a network interface card (NIC), which allows devices to be identified on a network.

Question 38

Which protocol is most commonly used for securing communication over the internet?

a) HTTP
b) FTP
c) HTTPS
d) DNS

Correct Answer: c) HTTPS

Explanation: HTTPS is the secure version of HTTP and is used for secure communication over the internet, particularly for online transactions.

Question 39

Which network device is responsible for directing packets of data between different networks?

a) Switch

b) Router

c) Hub

d) Bridge

Correct Answer: b) Router

Explanation: Routers direct data packets between different networks, using IP addresses to determine the best path for the data to travel.

Question 40

Which term refers to a criminal activity where a perpetrator logs every keystroke made by a user to steal sensitive information?

a) Spamming

b) Phishing

c) Keylogging

d) Trojan Horse

Correct Answer: c) Keylogging

Explanation: Keylogging involves recording keystrokes made on a computer to steal sensitive information like passwords or credit card numbers.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D076 Practice Exam Questions – Set 1 – Part 1
Next Post
WGU D075 Practice Exam Questions – Set 1 – Part 3