-
web.groovymark@gmail.com
- November 28, 2024
Question 21
Which phase of the SDLC involves determining user requirements for a system?
A) Implementation
B) Maintenance
C) Analysis
D) Physical Design
Correct Answer: C) Analysis
Explanation: The analysis phase of the System Development Life Cycle (SDLC) determines the user requirements and system needs.
Question 22
What is the function of a file server?
A) Store web pages
B) Monitor print jobs
C) Send files over the network
D) Process database queries
Correct Answer: C) Send files over the network
Explanation: A file server sends and stores files over a network in response to client requests.
Question 23
What does ODBC stand for?
A) Object Database Connectivity
B) Open Database Connectivity
C) Online Database Connectivity
D) Optimal Database Connectivity
Correct Answer: B) Open Database Connectivity
Explanation: ODBC (Open Database Connectivity) is an interface for accessing database management systems.
Question 24
Which network topology connects all devices directly to each other?
A) Star
B) Bus
C) Ring
D) Mesh
Correct Answer: D) Mesh
Explanation: A mesh network topology connects every device directly to each other, ensuring high redundancy and reliability.
Question 25
What is the purpose of the system clock in a computer?
A) To manage data storage
B) To control the speed of processing instructions
C) To store system files
D) To monitor network traffic
Correct Answer: B) To control the speed of processing instructions
Explanation: The system clock regulates the speed at which a computer processes instructions by synchronizing its operations.
Question 26
Which command in SQL is used to retrieve data from a database?
A) INSERT
B) DELETE
C) SELECT
D) UPDATE
Correct Answer: C) SELECT
Explanation: The SELECT command in SQL is used to retrieve data from one or more tables in a database.
Question 27
Which component of a computer system holds the CPU and memory, allowing communication between various parts of the system?
A) Power Supply
B) Hard Disk
C) Motherboard
D) BIOS
Correct Answer: C) Motherboard
Explanation: The motherboard is the main circuit board of a computer, holding the CPU and memory and facilitating communication between all components.
Question 28
What is a brute force attack?
A) An attack that uses malware to steal data
B) An attack that floods a server with requests
C) An attack that tries all possible combinations of letters and numbers to crack a password
D) An attack that redirects users to fake websites
Correct Answer: C) An attack that tries all possible combinations of letters and numbers to crack a password
Explanation: A brute force attack attempts to crack a password by trying all possible combinations of letters and numbers until the correct one is found.
Question 29
Which law protects the privacy of medical information?
A) FERPA
B) SEAL
C) HIPAA
D) PCI
Correct Answer: C) HIPAA
Explanation: HIPAA (Health Insurance Portability and Accountability Act) ensures the protection of medical information and patient privacy.
Question 30
What does PCI stand for?
A) Personal Computer Integration
B) Payment Card Industry
C) Private Cloud Infrastructure
D) Public Computing Interface
Correct Answer: B) Payment Card Industry
Explanation: PCI (Payment Card Industry) Data Security Standard is a set of requirements for organizations that handle credit card transactions to ensure secure handling of payment data.
Question 31
What is the purpose of a primary key in a relational database?
A) Python
B) JavaScript
C) C++
D) HTML
Correct Answer: C) C++
Explanation: C++ is a compiled programming language that is translated into machine code before execution, unlike interpreted languages such as Python and JavaScript.
Question 32
Which of the following describes a scenario-based analysis that evaluates how specific risks could impact business operations?
A) To store file metadata
B) To serve as a unique identifier for records
C) To manage relationships between tables
D) To encrypt sensitive data
Correct Answer: B) To serve as a unique identifier for records
Explanation: A primary key is a field in a table that contains a unique value for each record, ensuring that each record can be uniquely identified
Question 33
Which phase of the SDLC involves converting logical models into physical models?
A) Analysis
B) Logical Design
C) Physical Design
D) Maintenance
Correct Answer: C) Physical Design
Explanation: The physical design phase of the SDLC involves converting the logical models developed in earlier stages into actual physical models.
Question 34
Which type of testing is performed by end users using live data without assistance from developers?
A) Alpha Testing
B) Beta Testing
C) Unit Testing
D) System Testing
Correct Answer: B) Beta Testing
Explanation: Beta testing is performed by end users in a real working environment using live data without assistance from developers.
Question 35
What is the main role of a network administrator?
A) Manage databases
B) Write software programs
C) Oversee computer networks
D) Design websites
Correct Answer: C) Oversee computer networks
Explanation: A network administrator is responsible for managing and maintaining computer networks, ensuring connectivity, and resolving network-related issues.
Question 36
Which component of a CPU retrieves instructions and data to be processed?
A) Arithmetic Logic Unit
B) Control Unit
C) Cache
D) Register
Correct Answer: B) Control Unit
Explanation: The control unit retrieves instructions and data from memory, directing the CPU on how to process them.
Question 37
Which backup method stores a complete copy of all the data every time it is run?
A) Incremental Backup
B) Differential Backup
C) Full Backup
D) Mirror Backup
Correct Answer: C) Full Backup
Explanation: A full backup creates a complete copy of all data, including system files, every time it is performed.
Question 38
What does ETL stand for in the context of data processing?
A) Extract, Transform, Load
B) Enter, Transfer, Link
C) Encode, Track, Label
D) Edit, Transfer, Log
Correct Answer: A) Extract, Transform, Load
Explanation: ETL stands for Extract, Transform, Load, which is a process used in data processing to extract data from one source, transform it into the desired format, and load it into the target database.
Question 39
Which method of access control grants or denies access to resources based on roles assigned to users
A) Mandatory Access Control
B) Role-Based Access Control
C) Discretionary Access Control
D) Attribute-Based Access Control
Correct Answer: B) Role-Based Access Control
Explanation: Role-Based Access Control (RBAC) grants or denies access to resources based on the roles assigned to users within an organization.
Question 40
Which of the following is a non-volatile memory?
A) RAM
B) Cache
C) ROM
D) Register
Correct Answer: C) ROM
Explanation: ROM (Read-Only Memory) is a non-volatile memory that retains its contents even when the computer is powered off.