- web.groovymark@gmail.com
- November 28, 2024
Question 01
Which risk management strategy is used when an organization eliminates a risky activity entirely?
A) Risk Acceptance
B) Risk Avoidance
C) Risk Mitigation
D) Risk Transference
Correct Answer: B) Risk Avoidance
Explanation: Risk Avoidance involves eliminating a risky activity altogether to prevent risk. Risk Acceptance tolerates risk, Risk Mitigation reduces it, and Risk Transference shifts it to another party.
Question 02
Which backup method only captures the changes made since the last full backup?
A) Full backup
B) Incremental backup
C) Differential backup
D) Mirror backup
Correct Answer: B) Incremental backup
Explanation: Incremental backup captures only the changes made since the last full backup, making it faster and more efficient.
Question 03
Which part of a computer system temporarily stores data and loses its contents when power is turned off?
A) ROM
B) RAM
C) SSD
D) Hard Disk
Correct Answer: B) RAM
Explanation: RAM (Random Access Memory) is a volatile memory that temporarily stores data and is cleared when the power is off.
Question 04
What does SaaS stand for?
A) Storage as a Service
B) Software as a Service
C) Security as a Service
D) System as a Service
Correct Answer: B) Software as a Service
Explanation: SaaS stands for Software as a Service, where users can access and use software applications over the internet.
Question 05
What is the core part of an operating system called?
A) File System
B) Kernel
C) Command Line Interface
D) Device Driver
Correct Answer: B) Kernel
Explanation: The kernel is the core of the operating system, managing system resources and communication between hardware and software.
Question 06
Which type of operating system is used for mobile devices like smartphones?
A) Server OS
B) Personal Computer OS
C) Mobile OS
D) Network OS
Correct Answer: C) Mobile OS
Explanation: Mobile operating systems such as iOS and Android are designed for mobile devices like smartphones and tablets.
Question 07
Which data type allows only two possible values, such as TRUE or FALSE?
A) Integer
B) String
C) Boolean
D) Floating-point
Correct Answer: C) Boolean
Explanation: Boolean data type stores values as TRUE or FALSE.
Question 08
What is the purpose of a firewall in a computer network?
A) To store files
B) To improve computer performance
C) To prevent unauthorized access to a network
D) To manage network traffic
Correct Answer: C) To prevent unauthorized access to a network
Explanation: A firewall protects a network by blocking unauthorized access while allowing authorized communications.
Question 09
Which of the following is used to amplify or switch electronic signals in a computer system?
A) Capacitor
B) Transistor
C) Diode
D) Resistor
Correct Answer: B) Transistor
Explanation: A transistor is a semiconductor device used to amplify or switch electronic signals and power in a computer system.
Question 10
Which programming language is commonly used for managing databases?
A) HTML
B) CSS
C) SQL
D) JavaScript
Correct Answer: C) SQL
Explanation: SQL (Structured Query Language) is a programming language specifically designed for managing and manipulating databases.
Question 11
What is the process of copying everything on a hard drive, including system files, called?
A) Incremental backup
B) Full backup
C) Partial backup
D) Mirror backup
Correct Answer: B) Full backup
Explanation: A full backup copies all data, including system files, from the hard drive.
Question 12
What does RAM stand for?
A) Random Access Memory
B) Read Access Memory
C) Run Access Memory
D) Real Access Memory
Correct Answer: A) Random Access Memory
Explanation: RAM stands for Random Access Memory, which temporarily stores data that is being processed by the CPU.
Question 13
Which law protects student education records?
A) HIPAA
B) FERPA
C) SEAL
D) PCI
Correct Answer: B) FERPA
Explanation: FERPA (Family Educational Rights and Privacy Act) protects the privacy of student education records.
Question 14
What is the most common type of database structure that contains multiple tables?
A) Flat File Database
B) Hierarchical Database
C) Relational Database
D) Object-Oriented Database
Correct Answer: C) Relational Database
Explanation: A relational database contains multiple tables with interrelated fields and is the most common structure used for databases.
Question 15
What is the purpose of a DNS server?
A) To host websites
B) To translate domain names into IP addresses
C) To store user data
D) To filter internet content
Correct Answer: B) To translate domain names into IP addresses
Explanation: A Domain Name Server (DNS) converts user-friendly domain names into IP addresses that computers use to identify each other on a network.
Question 16
Which type of operating system is designed to run on servers?
A) Mobile OS
B) Server OS
C) Personal Computer OS
D) Network OS
Correct Answer: B) Server OS
Explanation: A server OS is optimized to manage and provide services to multiple users on a server.
Question 17
Which data structure organizes data in a tree-like format with a parent-child relationship?
A) Relational Database
B) Flat File Database
C) Object-Oriented Database
D) Hierarchical Database
Correct Answer: D) Hierarchical Database
Explanation: A hierarchical database organizes data in a tree-like structure, where each record has a parent-child relationship.
Question 18
What is a flat file database?
A) A database with multiple tables
B) A one-dimensional database stored in plain text
C) A database that stores objects
D) A multi-dimensional database for OLAP
Correct Answer: B) A one-dimensional database stored in plain text
Explanation: A flat file database is one-dimensional and stores data in plain text files with fields separated by delimiters.
Question 19
What is the function of a data warehouse?
A) Store web pages
B) Perform online transactions
C) Organize and analyze large amounts of data
D) Store real-time data
Correct Answer: C) Organize and analyze large amounts of data
Explanation: A data warehouse stores and organizes large amounts of structured data to support data analysis and business intelligence.
Question 20
Which type of cyber attack attempts to flood a server with so many requests that it becomes unavailable?
A) Phishing
B) Virus
C) Trojan Horse
D) Denial of Service (DoS)
Correct Answer: D) Denial of Service (DoS)
Explanation: A Denial of Service (DoS) attack attempts to make a server unavailable by overwhelming it with requests.