-
web.groovymark@gmail.com
- November 28, 2024
Question 21
Which data type cannot be easily processed or organized due to its unstructured format?
a) Structured data
b) Unstructured data
c) Semi-structured data
d) Normalized data
Correct Answer: b) Unstructured data
Explanation: Unstructured data cannot be easily organized into a predefined format, making it more difficult to analyze without specific techniques like text mining.
Question 22
Which type of topology is least commonly used due to its inefficiency in scaling for large networks?
a) Star topology
b) Ring topology
c) Bus topology
d) Mesh topology
Correct Answer: b) Ring topology
Explanation: Ring topology is less commonly used because it requires data to pass through each node, which can slow down communication as the network grows.
Question 23
What is the term used for a situation where a computer or its resources become unavailable to its users due to an attack?
a) Denial-of-Service (DoS)
b) Phishing
c) Trojan Horse
d) Keylogging
Correct Answer: a) Denial-of-Service (DoS)
Explanation: A DoS attack floods a network or computer with traffic, making it unavailable to its intended users.
Question 24
Which data processing approach allows you to run daily reports on inventory and sales?
a) Transaction Processing System (TPS)
b) Online Analytical Processing (OLAP)
c) Data Mining
d) Relational Database Management System (RDBMS)
Correct Answer: b) Online Analytical Processing (OLAP)
Explanation: OLAP provides tools for performing multidimensional analysis, such as running reports on inventory and sales data.
Question 25
Which of the following cloud-based tools is typically used to allow collaboration across teams from different locations?
a) Network Interface Card (NIC)
b) Dropbox
c) File Allocation Table (FAT)
d) Object Linking and Embedding (OLE)
Correct Answer: b) Dropbox
Explanation: Dropbox is a cloud-based file synchronization and collaboration tool that allows teams to share and work on documents regardless of location.
Question 26
What type of data is represented in tables that consist of rows and columns and can be easily queried using SQL?
a) Semi-structured data
b) Structured data
c) Unstructured data
d) Big data
Correct Answer: b) Structured data
Explanation: Structured data is organized in tables with rows and columns, making it easy to query and analyze using languages like SQL.
Question 27
Which technology provides faster data access compared to traditional hard drives because it has no moving parts?
a) Solid State Drive (SSD)
b) Optical Disk
c) Hard Disk Drive (HDD)
d) RAM
Correct Answer: a) Solid State Drive (SSD)
Explanation: SSDs provide faster access to data compared to HDDs because they use flash memory with no moving parts.
Question 28
Which type of data is stored in a fixed format, often within traditional fields and records?
a) Unstructured data
b) Semi-structured data
c) Structured data
d) Big data
Correct Answer: c) Structured data
Explanation: Structured data resides in a fixed format, such as a table, with clearly defined fields and records, making it easier to query and manage.
Question 29
What is the primary purpose of normalization in a database?
a) To encrypt data
b) To remove redundant data
c) To analyze large sets of data
d) To increase network speed
Correct Answer: b) To remove redundant data
Explanation: Normalization is the process of organizing data in a database to eliminate redundancy and improve efficiency.
Question 30
What does the term ‘MAC address’ refer to?
a) A computer’s IP address
b) A unique identifier assigned to network interfaces
c) A security protocol for network communication
d) A type of firewall
Correct Answer: b) A unique identifier assigned to network interfaces
Explanation: A MAC (Media Access Control) address is a unique identifier assigned to a network interface card (NIC) for communication within a network.
Question 31
Which device allows computers to connect to a wireless network?
a) Router
b) Ethernet Cable
c) Wireless Access Point
d) Hub
Correct Answer: c) Wireless Access Point
Explanation: A wireless access point allows devices to connect to a wireless network by transmitting and receiving data over Wi-Fi.
Question 32
Which network topology is characterized by a central hub that connects all network devices?
a) Ring topology
b) Star topology
c) Bus topology
d) Mesh topology
Correct Answer: b) Star topology
Explanation: In a star topology, all devices are connected to a central hub, which manages communication between them.
Question 33
Which of the following refers to the ability to run multiple programs simultaneously by utilizing system resources efficiently?
a) Multitasking
b) Virtualization
c) Multi-threading
d) Parallel processing
Correct Answer: a) Multitasking
Explanation: Multitasking allows a computer to run multiple programs at the same time by allocating system resources, such as CPU and RAM, efficiently.
Question 34
Which of the following describes a set of protocols used to connect a network to the internet?
a) HTTP
b) TCP/IP
c) DNS
d) FTP
Correct Answer: b) TCP/IP
Explanation: TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of networking protocols used to connect devices to the internet.
Question 35
Which device is primarily responsible for filtering and forwarding data packets to their correct destination on a local network?
a) Router
b) Switch
c) Firewall
d) Hub
Correct Answer: b) Switch
Explanation: A switch is responsible for directing data packets to the correct destination within a local network.
Question 36
Which of the following describes a unique address assigned to devices on a network, allowing them to communicate?
a) IP address
b) MAC address
c) DNS
d) Router
Correct Answer: a) IP address
Explanation: An IP address is a unique identifier assigned to devices on a network, allowing them to communicate with each other over the internet.
Question 37
Which of the following is a form of malicious software that deceives users into executing harmful actions?
a) Trojan Horse
b) Keylogging
c) Denial-of-Service (DoS)
d) Phishing
Correct Answer: a) Trojan Horse
Explanation: A Trojan Horse is a malicious program that appears harmless but can execute harmful actions when run.
Question 38
Which term is used to describe the part of the computer that holds data temporarily during processing?
a) RAM
b) Hard Drive
c) Cache
d) CPU
Correct Answer: a) RAM
Explanation: RAM (Random Access Memory) holds data temporarily while the CPU processes it, allowing for fast access to data.
Question 39
Which type of data is analyzed for trends and patterns, often used to predict future behavior?
a) Structured data
b) Descriptive data
c) Predictive data
d) Unstructured data
Correct Answer: c) Predictive data
Explanation: Predictive data is analyzed to identify trends and make informed predictions about future behavior.
Question 40
Which of the following is an example of a peer-to-peer (P2P) network?
a) A client-server network
b) A network where devices communicate directly without a central server
c) A network managed by a dedicated server
d) A network with a central switch
Correct Answer: b) A network where devices communicate directly without a central server
Explanation: In a peer-to-peer (P2P) network, devices communicate directly with each other without relying on a central server.