-
web.groovymark@gmail.com
- November 28, 2024
Question 21
Which of the following statements is true about malware?
a) It refers to any malicious software designed to harm a computer system
b) It is only used for data mining
c) It is always installed with user consent
d) It cannot be detected by antivirus software
Correct Answer: a) It refers to any malicious software designed to harm a computer system
Explanation: Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
Question 22
Which technology allows remote access to applications, data, and services through the internet?
a) Local Area Network (LAN)
b) Cloud Computing
c) Bluetooth
d) Ethernet
Correct Answer: b) Cloud Computing
Explanation: Cloud computing allows users to access and store data and programs over the internet instead of relying on local computers.
Question 23
What type of malware can spread itself across a network without any user interaction?
a) Virus
b) Worm
c) Trojan
d) Adware
Correct Answer: a) AWS Direct Connect
Explanation: AWS Direct Connect allows you to establish a dedicated network connection from your on-premises data center to AWS.
Question 24
Which term describes the unique address assigned to each device on a network?
a) IP address
b) URL
c) DNS
d) MAC address
Correct Answer: a) IP address
Explanation: An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
Question 25
Which type of network is most commonly used within a single building or campus?
a) Wide Area Network (WAN)
b) Local Area Network (LAN)
c) Virtual Private Network (VPN)
d) Peer-to-Peer (P2P) Network
Correct Answer: b) Local Area Network (LAN)
Explanation: A LAN is a network that connects devices within a single building or campus, enabling communication and resource sharing.
Question 26
Which security measure restricts access to certain network resources?
a) VPN
b) Permissions
c) Malware
d) Firewall
Correct Answer: b) Permissions
Explanation: Permissions allow administrators to restrict access to files and network resources, ensuring that only authorized users can access them.
Question 27
Which protocol defines how messages are transmitted and formatted on the internet?
a) DNS
b) HTTP
c) FTP
d) TCP/IP
Correct Answer: b) HTTP
Explanation: HTTP (Hypertext Transfer Protocol) defines how messages are formatted and transmitted over the internet.
Question 28
Which of the following is a central computer in a network that manages resources?
a) Client
b) Server
c) Switch
d) Router
Correct Answer: b) Server
Explanation: A server is a central computer that manages and provides resources, such as files and applications, to clients in a network.
Question 29
Which type of network connects multiple LANs across a large geographic area?
a) LAN
b) WAN
c) CAN
d) VPN
Correct Answer: b) WAN
Explanation: A Wide Area Network (WAN) connects multiple LANs over a large geographic area, such as a city, country, or even worldwide.
Question 30
Which of the following describes a software suite?
a) A collection of application programs that share common features
b) A type of system software
c) A programming language
d) A network protocol
Correct Answer: a) A collection of application programs that share common features
Explanation: A software suite is a collection of related software applications, such as Microsoft Office, which share a common user interface and allow data to be exchanged between them.
Question 31
Which of the following is the process of making sure data is accurate and consistent?
a) Data Mining
b) Data Validation
c) Data Encryption
d) Data Warehousing
Correct Answer: b) Data Validation
Explanation: Data validation ensures that data entered into a system is accurate, consistent, and usable, preventing errors in data processing.
Question 32
What is the primary purpose of a firewall in a network?
a) To connect two networks
b) To block unauthorized access
c) To increase network speed
d) To provide backup storage
Correct Answer: b) To block unauthorized access
Explanation: A firewall is used to block unauthorized access to a network while allowing legitimate communication.
Question 33
Which protocol is responsible for mapping a domain name to an IP address?
a) HTTP
b) DNS
c) FTP
d) TCP/IP
Correct Answer: b) DNS
Explanation: DNS (Domain Name System) is responsible for translating human-readable domain names into IP addresses that computers use to identify each other on the network.
Question 34
Which memory type is faster and closer to the CPU?
a) Hard Disk
b) Cache Memory
c) SSD
d) Optical Disk
Correct Answer: b) Cache Memory
Explanation: Cache memory is faster and closer to the CPU than other memory types, allowing frequently accessed data to be retrieved quickly.
Question 35
What is the primary purpose of a VPN (Virtual Private Network)?
a) To provide a public connection
b) To encrypt data and provide a secure connection
c) To increase internet speed
d) To store data remotely
Correct Answer: b) To encrypt data and provide a secure connection
Explanation: A VPN provides a secure, encrypted connection over the internet, often used to protect data and privacy.
Question 36
Which process helps remove redundancies in a database?
a) Data Mining
b) Normalization
c) Data Encryption
d) Data Mapping
Correct Answer: b) Normalization
Explanation: Normalization helps remove redundancies and ensures that data is stored efficiently in a database.
Question 37
Which type of software is used to develop websites?
a) Word Processor
b) Web Development Software
c) Spreadsheet Software
d) Database Software
Correct Answer: b) Web Development Software
Explanation: Web development software, such as Dreamweaver, is used to develop, design, and publish websites.
Question 38
Which of the following refers to a collection of files stored on a disk?
a) Database
b) Table
c) Directory
d) Field
Correct Answer: c) Directory
Explanation: A directory is a collection of files stored on a disk, organized to allow easy access and management.
Question 39
Which device converts digital signals into analog signals for transmission over phone lines?
a) Modem
b) Router
c) Switch
d) Firewall
Correct Answer: a) Modem
Explanation: A modem (modulator-demodulator) converts digital data into analog signals for transmission over telephone lines.
Question 40
What does ‘URL’ stand for in the context of web browsing?
a) Universal Remote Locator
b) Uniform Resource Locator
c) Unique Resource Link
d) User Response Link
Correct Answer: b) Uniform Resource Locator
Explanation: A URL (Uniform Resource Locator) is the address used to access resources on the internet, such as websites.