OA Exams

  • web.groovymark@gmail.com
  • November 28, 2024

Question 21

Which of the following is used to uniquely identify devices on a network?

  • a) MAC address
  • b) IP address
  • c) URL
  • d) Hostname

Correct Answer: a) MAC address

Explanation: A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communication on a physical network.

Question 22

What is the primary function of a database management system (DBMS)?

  • a) To manage and query large datasets
  • b) To design user interfaces
  • c) To perform calculations
  • d) To create web pages

Correct Answer: a) To manage and query large datasets

Explanation: A DBMS is used to store, manage, and query data, enabling efficient retrieval and manipulation of information in databases.

Question 23

Which type of software allows users to create and edit text documents?

  • a) Spreadsheet Software
  • b) Word Processor
  • c) Presentation Software
  • d) Database Software

Correct Answer: b) Word Processor

Explanation: A word processor, such as Microsoft Word or Google Docs, allows users to create, format, and edit text documents.

Question 24

Which technology allows businesses to access computing resources and storage over the internet?

  • a) Local Hosting
  • b) Cloud Computing
  • c) Virtualization
  • d) LAN

Correct Answer: b) Cloud Computing

Explanation: Cloud computing allows businesses to access computing resources, storage, and applications over the internet, providing flexibility and scalability.

Question 25

Which protocol is responsible for securing communication on websites?

  • a) HTTP
  • b) HTTPS
  • c) FTP
  • d) SMTP

Correct Answer: b) HTTPS

Explanation: HTTPS (Hypertext Transfer Protocol Secure) is a protocol used to secure communication on websites by encrypting data transmitted between a user's browser and the website.

Question 26

Which of the following is an example of a relational database management system (RDBMS)?

  • a) Microsoft Excel
  • b) MySQL
  • c) Google Drive
  • d) Dropbox

Correct Answer: b) MySQL

Explanation: MySQL is a popular relational database management system (RDBMS) used to store, manage, and retrieve data organized in tables.

Question 27

Which of the following is an example of a ‘disaster recovery’ measure?

  • a) Installing an antivirus program
  • b) Backing up critical business data to the cloud
  • c) Upgrading to a faster computer
  • d) Hiring additional staff

Correct Answer: b) Backing up critical business data to the cloud

Explanation: Backing up critical data to the cloud is an essential disaster recovery measure that ensures data can be restored in case of hardware failure or other disasters.

Question 28

Which type of database organizes data in tables with relationships between them?

a) NoSQL Database
b) Relational Database
c) Object-Oriented Database
d) Flat File Database

Correct Answer: b) Relational Database

Explanation: A relational database organizes data into tables with relationships between them, allowing for efficient queries and data management.

Question 29

What is a key characteristic of structured data?

a) It is unorganized and difficult to process
b) It follows a fixed format and is well-labeled
c) It is data collected from social media
d) It is data stored in binary format

Correct Answer: b) It follows a fixed format and is well-labeled

Explanation: Structured data follows a fixed format and is stored in traditional databases, making it easier to process and query.

Question 30

Which component of a computer is responsible for carrying out instructions from programs?

a) RAM
b) SSD
c) CPU
d) Hard Drive

Correct Answer: c) CPU

Explanation: The CPU (Central Processing Unit) executes instructions from programs and performs calculations necessary for the system's operation.

.

Question 31

What type of network connects devices within a small geographical area, such as an office or home?

a) WAN
b) LAN
c) MAN
d) PAN

Correct Answer: b) LAN

Explanation: A Local Area Network (LAN) connects devices within a limited geographical area, such as a building or campus.

Question 32

What is the main benefit of using an SSD over a traditional hard drive?

a) Lower cost
b) Increased storage capacity
c) Faster read and write speeds
d) Longer lifespan

Correct Answer: c) Faster read and write speeds

Explanation: SSDs (Solid-State Drives) provide much faster data access speeds than traditional hard drives because they use flash memory with no moving parts.

Question 33

Which technology is often used to store and analyze large datasets?

a) Data Mining
b) Blockchain
c) Cloud Storage
d) Data Warehouse

Correct Answer: d) Data Warehouse

Explanation: A data warehouse is a system used for storing large datasets, enabling organizations to analyze and derive insights from the data.

Question 34

Which type of malware is designed to lock a user out of their system or files until a ransom is paid?

a) Trojan Horse
b) Spyware
c) Ransomware
d) Adware

Correct Answer: c) Ransomware

Explanation: Ransomware encrypts files or locks users out of their systems and demands a ransom for unlocking them.

Question 35

Which protocol is used for secure web communication and encrypts data transmitted between the client and the server?

a) HTTP
b) FTP
c) HTTPS
d) SMTP

Correct Answer: c) HTTPS

Explanation: HTTPS (Hypertext Transfer Protocol Secure) encrypts data transmitted between the client (browser) and the server to ensure secure communication.

Question 36

What is the purpose of a network switch in a LAN?

a) To connect different networks together
b) To block unauthorized access
c) To manage and direct data traffic within a LAN
d) To encrypt network traffic

Correct Answer: c) To manage and direct data traffic within a LAN

Explanation: A network switch is used to direct data traffic within a LAN by sending data packets to the correct device.

Question 37

Which cloud computing model provides infrastructure services such as storage and servers?

a) SaaS
b) PaaS
c) IaaS
d) DaaS

Correct Answer: c) IaaS

Explanation: Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, including storage, servers, and networking.

Question 38

What does ETL stand for in the context of data processing?

a) Extract, Transform, Load
b) Encrypt, Transfer, Log
c) Execute, Transfer, Log
d) Enhance, Transfer, Load

Correct Answer: a) Extract, Transform, Load

Explanation: ETL refers to the process of extracting data from various sources, transforming it into a suitable format, and loading it into a target system, such as a data warehouse.

Question 39

Which device allows multiple devices to communicate wirelessly within a network?

a) Switch
b) Router
c) Wi-Fi Access Point
d) Hub

Correct Answer: c) Wi-Fi Access Point

Explanation: A Wi-Fi access point allows wireless devices to connect to a network and communicate with other devices.

Question 40

Which type of encryption uses the same key for both encryption and decryption?

a) Asymmetric encryption
b) Public key encryption
c) Symmetric encryption
d) One-time pad

Correct Answer: c) Symmetric encryption

Explanation: Symmetric encryption uses the same key for both encryption and decryption, making it faster but requiring secure key management.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D076 Practice Exam Questions – Set 2 – Part 3
Next Post
WGU D075 Practice Exam Questions – Set 4 – Part 3