OA Exams

  • web.groovymark@gmail.com
  • November 28, 2024

Question 21

Which of the following statements is true about malware?

a) It refers to any malicious software designed to harm a computer system
b) It is only used for data mining
c) It is always installed with user consent
d) It cannot be detected by antivirus software

Correct Answer: a) It refers to any malicious software designed to harm a computer system

Explanation: Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.

Question 22

Which technology allows remote access to applications, data, and services through the internet?

a) Local Area Network (LAN)
b) Cloud Computing
c) Bluetooth
d) Ethernet

Correct Answer: b) Cloud Computing

Explanation: Cloud computing allows users to access and store data and programs over the internet instead of relying on local computers.

Question 23

What type of malware can spread itself across a network without any user interaction?

a) Virus
b) Worm
c) Trojan
d) Adware

Correct Answer: a) AWS Direct Connect

Explanation: AWS Direct Connect allows you to establish a dedicated network connection from your on-premises data center to AWS.

Question 24

Which term describes the unique address assigned to each device on a network?

a) IP address
b) URL
c) DNS
d) MAC address

Correct Answer: a) IP address

Explanation: An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

Question 25

Which type of network is most commonly used within a single building or campus?

a) Wide Area Network (WAN)
b) Local Area Network (LAN)
c) Virtual Private Network (VPN)
d) Peer-to-Peer (P2P) Network

Correct Answer: b) Local Area Network (LAN)

Explanation: A LAN is a network that connects devices within a single building or campus, enabling communication and resource sharing.

Question 26

Which security measure restricts access to certain network resources?

a) VPN
b) Permissions
c) Malware
d) Firewall

Correct Answer: b) Permissions

Explanation: Permissions allow administrators to restrict access to files and network resources, ensuring that only authorized users can access them.

Question 27

Which protocol defines how messages are transmitted and formatted on the internet?

a) DNS
b) HTTP
c) FTP
d) TCP/IP

Correct Answer: b) HTTP

Explanation: HTTP (Hypertext Transfer Protocol) defines how messages are formatted and transmitted over the internet.

Question 28

Which of the following is a central computer in a network that manages resources?

a) Client
b) Server
c) Switch
d) Router

Correct Answer: b) Server

Explanation: A server is a central computer that manages and provides resources, such as files and applications, to clients in a network.

Question 29

Which type of network connects multiple LANs across a large geographic area?

a) LAN
b) WAN
c) CAN
d) VPN

Correct Answer: b) WAN

Explanation: A Wide Area Network (WAN) connects multiple LANs over a large geographic area, such as a city, country, or even worldwide.

Question 30

Which of the following describes a software suite?

a) A collection of application programs that share common features
b) A type of system software
c) A programming language
d) A network protocol

Correct Answer: a) A collection of application programs that share common features

Explanation: A software suite is a collection of related software applications, such as Microsoft Office, which share a common user interface and allow data to be exchanged between them.

Question 31

Which of the following is the process of making sure data is accurate and consistent?

a) Data Mining
b) Data Validation
c) Data Encryption
d) Data Warehousing

Correct Answer: b) Data Validation

Explanation: Data validation ensures that data entered into a system is accurate, consistent, and usable, preventing errors in data processing.

Question 32

 What is the primary purpose of a firewall in a network?

a) To connect two networks
b) To block unauthorized access
c) To increase network speed
d) To provide backup storage

Correct Answer: b) To block unauthorized access

Explanation: A firewall is used to block unauthorized access to a network while allowing legitimate communication.

Question 33

Which protocol is responsible for mapping a domain name to an IP address?

a) HTTP
b) DNS
c) FTP
d) TCP/IP

Correct Answer: b) DNS

Explanation: DNS (Domain Name System) is responsible for translating human-readable domain names into IP addresses that computers use to identify each other on the network.

Question 34

Which memory type is faster and closer to the CPU?

a) Hard Disk
b) Cache Memory
c) SSD
d) Optical Disk

Correct Answer: b) Cache Memory

Explanation: Cache memory is faster and closer to the CPU than other memory types, allowing frequently accessed data to be retrieved quickly.

Question 35

What is the primary purpose of a VPN (Virtual Private Network)?

a) To provide a public connection
b) To encrypt data and provide a secure connection
c) To increase internet speed
d) To store data remotely

Correct Answer: b) To encrypt data and provide a secure connection

Explanation: A VPN provides a secure, encrypted connection over the internet, often used to protect data and privacy.

Question 36

Which process helps remove redundancies in a database?

a) Data Mining
b) Normalization
c) Data Encryption
d) Data Mapping

Correct Answer: b) Normalization

Explanation: Normalization helps remove redundancies and ensures that data is stored efficiently in a database.

Question 37

Which type of software is used to develop websites?

a) Word Processor
b) Web Development Software
c) Spreadsheet Software
d) Database Software

Correct Answer: b) Web Development Software

Explanation: Web development software, such as Dreamweaver, is used to develop, design, and publish websites.

Question 38

Which of the following refers to a collection of files stored on a disk?

a) Database
b) Table
c) Directory
d) Field

Correct Answer: c) Directory

Explanation: A directory is a collection of files stored on a disk, organized to allow easy access and management.

Question 39

Which device converts digital signals into analog signals for transmission over phone lines?

a) Modem
b) Router
c) Switch
d) Firewall

Correct Answer: a) Modem

Explanation: A modem (modulator-demodulator) converts digital data into analog signals for transmission over telephone lines.

Question 40

What does ‘URL’ stand for in the context of web browsing?

a) Universal Remote Locator
b) Uniform Resource Locator
c) Unique Resource Link
d) User Response Link

Correct Answer: b) Uniform Resource Locator

Explanation: A URL (Uniform Resource Locator) is the address used to access resources on the internet, such as websites.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D076 Practice Exam Questions – Set 2 – Part 1
Next Post
WGU D075 Practice Exam Questions – Set 3 – Part 3