OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 28, 2024

Question 01

Which risk management strategy is used when an organization eliminates a risky activity entirely?

A) Risk Acceptance
B) Risk Avoidance
C) Risk Mitigation
D) Risk Transference

Correct Answer: B) Risk Avoidance

Explanation: Risk Avoidance involves eliminating a risky activity altogether to prevent risk. Risk Acceptance tolerates risk, Risk Mitigation reduces it, and Risk Transference shifts it to another party.

Question 02

Which backup method only captures the changes made since the last full backup?

A) Full backup
B) Incremental backup
C) Differential backup
D) Mirror backup

Correct Answer: B) Incremental backup

Explanation: Incremental backup captures only the changes made since the last full backup, making it faster and more efficient.

Question 03

Which part of a computer system temporarily stores data and loses its contents when power is turned off?

A) ROM
B) RAM
C) SSD
D) Hard Disk

Correct Answer: B) RAM

Explanation: RAM (Random Access Memory) is a volatile memory that temporarily stores data and is cleared when the power is off.

Question 04

What does SaaS stand for?

A) Storage as a Service
B) Software as a Service
C) Security as a Service
D) System as a Service

Correct Answer: B) Software as a Service

Explanation: SaaS stands for Software as a Service, where users can access and use software applications over the internet.

Question 05

What is the core part of an operating system called?

A) File System
B) Kernel
C) Command Line Interface
D) Device Driver

Correct Answer: B) Kernel

Explanation: The kernel is the core of the operating system, managing system resources and communication between hardware and software.

Question 06

Which type of operating system is used for mobile devices like smartphones?

A) Server OS
B) Personal Computer OS
C) Mobile OS
D) Network OS

Correct Answer: C) Mobile OS

Explanation: Mobile operating systems such as iOS and Android are designed for mobile devices like smartphones and tablets.

Question 07

Which data type allows only two possible values, such as TRUE or FALSE?

A) Integer
B) String
C) Boolean
D) Floating-point

Correct Answer: C) Boolean

Explanation: Boolean data type stores values as TRUE or FALSE.

Question 08

What is the purpose of a firewall in a computer network?

A) To store files
B) To improve computer performance
C) To prevent unauthorized access to a network
D) To manage network traffic

Correct Answer: C) To prevent unauthorized access to a network

Explanation: A firewall protects a network by blocking unauthorized access while allowing authorized communications.

Question 09

Which of the following is used to amplify or switch electronic signals in a computer system?

A) Capacitor
B) Transistor
C) Diode
D) Resistor

Correct Answer: B) Transistor

Explanation: A transistor is a semiconductor device used to amplify or switch electronic signals and power in a computer system.

Question 10

Which programming language is commonly used for managing databases?

A) HTML
B) CSS
C) SQL
D) JavaScript

Correct Answer: C) SQL

Explanation: SQL (Structured Query Language) is a programming language specifically designed for managing and manipulating databases.

Question 11

What is the process of copying everything on a hard drive, including system files, called?

A) Incremental backup
B) Full backup
C) Partial backup
D) Mirror backup

Correct Answer: B) Full backup

Explanation: A full backup copies all data, including system files, from the hard drive.

Question 12

 What does RAM stand for?

A) Random Access Memory
B) Read Access Memory
C) Run Access Memory
D) Real Access Memory

Correct Answer: A) Random Access Memory

Explanation: RAM stands for Random Access Memory, which temporarily stores data that is being processed by the CPU.

Question 13

Which law protects student education records?

A) HIPAA
B) FERPA
C) SEAL
D) PCI

Correct Answer: B) FERPA

Explanation: FERPA (Family Educational Rights and Privacy Act) protects the privacy of student education records.

Question 14

What is the most common type of database structure that contains multiple tables?

A) Flat File Database
B) Hierarchical Database
C) Relational Database
D) Object-Oriented Database

Correct Answer: C) Relational Database

Explanation: A relational database contains multiple tables with interrelated fields and is the most common structure used for databases.

Question 15

What is the purpose of a DNS server?

A) To host websites
B) To translate domain names into IP addresses
C) To store user data
D) To filter internet content

Correct Answer: B) To translate domain names into IP addresses

Explanation: A Domain Name Server (DNS) converts user-friendly domain names into IP addresses that computers use to identify each other on a network.

Question 16

Which type of operating system is designed to run on servers?

A) Mobile OS
B) Server OS
C) Personal Computer OS
D) Network OS

Correct Answer: B) Server OS

Explanation: A server OS is optimized to manage and provide services to multiple users on a server.

Question 17

Which data structure organizes data in a tree-like format with a parent-child relationship?

A) Relational Database
B) Flat File Database
C) Object-Oriented Database
D) Hierarchical Database

Correct Answer: D) Hierarchical Database

Explanation: A hierarchical database organizes data in a tree-like structure, where each record has a parent-child relationship.

Question 18

What is a flat file database?

A) A database with multiple tables
B) A one-dimensional database stored in plain text
C) A database that stores objects
D) A multi-dimensional database for OLAP

Correct Answer: B) A one-dimensional database stored in plain text

Explanation: A flat file database is one-dimensional and stores data in plain text files with fields separated by delimiters.

Question 19

What is the function of a data warehouse?

A) Store web pages
B) Perform online transactions
C) Organize and analyze large amounts of data
D) Store real-time data

Correct Answer: C) Organize and analyze large amounts of data

Explanation: A data warehouse stores and organizes large amounts of structured data to support data analysis and business intelligence.

Question 20

Which type of cyber attack attempts to flood a server with so many requests that it becomes unavailable?

A) Phishing
B) Virus
C) Trojan Horse
D) Denial of Service (DoS)

Correct Answer: D) Denial of Service (DoS)

Explanation: A Denial of Service (DoS) attack attempts to make a server unavailable by overwhelming it with requests.

Complete the Captcha to view next question set.

Prev Post
WGU D320 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D322 Practice Exam Questions – Set 1 – Part 2