-
web.groovymark@gmail.com
- November 28, 2024
Question 21
Which of the following is used to uniquely identify devices on a network?
- a) MAC address
- b) IP address
- c) URL
- d) Hostname
Correct Answer: a) MAC address
Explanation: A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communication on a physical network.
Question 22
What is the primary function of a database management system (DBMS)?
- a) To manage and query large datasets
- b) To design user interfaces
- c) To perform calculations
- d) To create web pages
Correct Answer: a) To manage and query large datasets
Explanation: A DBMS is used to store, manage, and query data, enabling efficient retrieval and manipulation of information in databases.
Question 23
Which type of software allows users to create and edit text documents?
- a) Spreadsheet Software
- b) Word Processor
- c) Presentation Software
- d) Database Software
Correct Answer: b) Word Processor
Explanation: A word processor, such as Microsoft Word or Google Docs, allows users to create, format, and edit text documents.
Question 24
Which technology allows businesses to access computing resources and storage over the internet?
- a) Local Hosting
- b) Cloud Computing
- c) Virtualization
- d) LAN
Correct Answer: b) Cloud Computing
Explanation: Cloud computing allows businesses to access computing resources, storage, and applications over the internet, providing flexibility and scalability.
Question 25
Which protocol is responsible for securing communication on websites?
- a) HTTP
- b) HTTPS
- c) FTP
- d) SMTP
Correct Answer: b) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is a protocol used to secure communication on websites by encrypting data transmitted between a user's browser and the website.
Question 26
Which of the following is an example of a relational database management system (RDBMS)?
- a) Microsoft Excel
- b) MySQL
- c) Google Drive
- d) Dropbox
Correct Answer: b) MySQL
Explanation: MySQL is a popular relational database management system (RDBMS) used to store, manage, and retrieve data organized in tables.
Question 27
Which of the following is an example of a ‘disaster recovery’ measure?
- a) Installing an antivirus program
- b) Backing up critical business data to the cloud
- c) Upgrading to a faster computer
- d) Hiring additional staff
Correct Answer: b) Backing up critical business data to the cloud
Explanation: Backing up critical data to the cloud is an essential disaster recovery measure that ensures data can be restored in case of hardware failure or other disasters.
Question 28
Which type of database organizes data in tables with relationships between them?
a) NoSQL Database
b) Relational Database
c) Object-Oriented Database
d) Flat File Database
Correct Answer: b) Relational Database
Explanation: A relational database organizes data into tables with relationships between them, allowing for efficient queries and data management.
Question 29
What is a key characteristic of structured data?
a) It is unorganized and difficult to process
b) It follows a fixed format and is well-labeled
c) It is data collected from social media
d) It is data stored in binary format
Correct Answer: b) It follows a fixed format and is well-labeled
Explanation: Structured data follows a fixed format and is stored in traditional databases, making it easier to process and query.
Question 30
Which component of a computer is responsible for carrying out instructions from programs?
a) RAM
b) SSD
c) CPU
d) Hard Drive
Correct Answer: c) CPU
Explanation: The CPU (Central Processing Unit) executes instructions from programs and performs calculations necessary for the system's operation.
.
Question 31
What type of network connects devices within a small geographical area, such as an office or home?
a) WAN
b) LAN
c) MAN
d) PAN
Correct Answer: b) LAN
Explanation: A Local Area Network (LAN) connects devices within a limited geographical area, such as a building or campus.
Question 32
What is the main benefit of using an SSD over a traditional hard drive?
a) Lower cost
b) Increased storage capacity
c) Faster read and write speeds
d) Longer lifespan
Correct Answer: c) Faster read and write speeds
Explanation: SSDs (Solid-State Drives) provide much faster data access speeds than traditional hard drives because they use flash memory with no moving parts.
Question 33
Which technology is often used to store and analyze large datasets?
a) Data Mining
b) Blockchain
c) Cloud Storage
d) Data Warehouse
Correct Answer: d) Data Warehouse
Explanation: A data warehouse is a system used for storing large datasets, enabling organizations to analyze and derive insights from the data.
Question 34
Which type of malware is designed to lock a user out of their system or files until a ransom is paid?
a) Trojan Horse
b) Spyware
c) Ransomware
d) Adware
Correct Answer: c) Ransomware
Explanation: Ransomware encrypts files or locks users out of their systems and demands a ransom for unlocking them.
Question 35
Which protocol is used for secure web communication and encrypts data transmitted between the client and the server?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
Correct Answer: c) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) encrypts data transmitted between the client (browser) and the server to ensure secure communication.
Question 36
What is the purpose of a network switch in a LAN?
a) To connect different networks together
b) To block unauthorized access
c) To manage and direct data traffic within a LAN
d) To encrypt network traffic
Correct Answer: c) To manage and direct data traffic within a LAN
Explanation: A network switch is used to direct data traffic within a LAN by sending data packets to the correct device.
Question 37
Which cloud computing model provides infrastructure services such as storage and servers?
a) SaaS
b) PaaS
c) IaaS
d) DaaS
Correct Answer: c) IaaS
Explanation: Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, including storage, servers, and networking.
Question 38
What does ETL stand for in the context of data processing?
a) Extract, Transform, Load
b) Encrypt, Transfer, Log
c) Execute, Transfer, Log
d) Enhance, Transfer, Load
Correct Answer: a) Extract, Transform, Load
Explanation: ETL refers to the process of extracting data from various sources, transforming it into a suitable format, and loading it into a target system, such as a data warehouse.
Question 39
Which device allows multiple devices to communicate wirelessly within a network?
a) Switch
b) Router
c) Wi-Fi Access Point
d) Hub
Correct Answer: c) Wi-Fi Access Point
Explanation: A Wi-Fi access point allows wireless devices to connect to a network and communicate with other devices.
Question 40
Which type of encryption uses the same key for both encryption and decryption?
a) Asymmetric encryption
b) Public key encryption
c) Symmetric encryption
d) One-time pad
Correct Answer: c) Symmetric encryption
Explanation: Symmetric encryption uses the same key for both encryption and decryption, making it faster but requiring secure key management.