OA Exams

  • web.groovymark@gmail.com
  • November 28, 2024

Question 21

Which phase of the SDLC involves determining user requirements for a system?

A) Implementation
B) Maintenance
C) Analysis
D) Physical Design

Correct Answer: C) Analysis

Explanation: The analysis phase of the System Development Life Cycle (SDLC) determines the user requirements and system needs.

Question 22

What is the function of a file server?

A) Store web pages
B) Monitor print jobs
C) Send files over the network
D) Process database queries

Correct Answer: C) Send files over the network

Explanation: A file server sends and stores files over a network in response to client requests.

Question 23

 What does ODBC stand for?

A) Object Database Connectivity
B) Open Database Connectivity
C) Online Database Connectivity
D) Optimal Database Connectivity

Correct Answer: B) Open Database Connectivity

Explanation: ODBC (Open Database Connectivity) is an interface for accessing database management systems.

Question 24

Which network topology connects all devices directly to each other?

A) Star
B) Bus
C) Ring
D) Mesh

Correct Answer: D) Mesh

Explanation: A mesh network topology connects every device directly to each other, ensuring high redundancy and reliability.

Question 25

What is the purpose of the system clock in a computer?

A) To manage data storage
B) To control the speed of processing instructions
C) To store system files
D) To monitor network traffic

Correct Answer: B) To control the speed of processing instructions

Explanation: The system clock regulates the speed at which a computer processes instructions by synchronizing its operations.

Question 26

Which command in SQL is used to retrieve data from a database?

A) INSERT
B) DELETE
C) SELECT
D) UPDATE

Correct Answer: C) SELECT

Explanation: The SELECT command in SQL is used to retrieve data from one or more tables in a database.

Question 27

Which component of a computer system holds the CPU and memory, allowing communication between various parts of the system?

A) Power Supply
B) Hard Disk
C) Motherboard
D) BIOS

Correct Answer: C) Motherboard

Explanation: The motherboard is the main circuit board of a computer, holding the CPU and memory and facilitating communication between all components.

Question 28

What is a brute force attack?

A) An attack that uses malware to steal data
B) An attack that floods a server with requests
C) An attack that tries all possible combinations of letters and numbers to crack a password
D) An attack that redirects users to fake websites

Correct Answer: C) An attack that tries all possible combinations of letters and numbers to crack a password

Explanation: A brute force attack attempts to crack a password by trying all possible combinations of letters and numbers until the correct one is found.

Question 29

Which law protects the privacy of medical information?

A) FERPA
B) SEAL
C) HIPAA
D) PCI

Correct Answer: C) HIPAA

Explanation: HIPAA (Health Insurance Portability and Accountability Act) ensures the protection of medical information and patient privacy.

Question 30

 What does PCI stand for?

A) Personal Computer Integration
B) Payment Card Industry
C) Private Cloud Infrastructure
D) Public Computing Interface

Correct Answer: B) Payment Card Industry

Explanation: PCI (Payment Card Industry) Data Security Standard is a set of requirements for organizations that handle credit card transactions to ensure secure handling of payment data.

Question 31

What is the purpose of a primary key in a relational database?

A) Python
B) JavaScript
C) C++
D) HTML

Correct Answer: C) C++

Explanation: C++ is a compiled programming language that is translated into machine code before execution, unlike interpreted languages such as Python and JavaScript.

Question 32

Which of the following describes a scenario-based analysis that evaluates how specific risks could impact business operations?

A) To store file metadata
B) To serve as a unique identifier for records
C) To manage relationships between tables
D) To encrypt sensitive data

Correct Answer: B) To serve as a unique identifier for records

Explanation: A primary key is a field in a table that contains a unique value for each record, ensuring that each record can be uniquely identified

Question 33

Which phase of the SDLC involves converting logical models into physical models?

A) Analysis
B) Logical Design
C) Physical Design
D) Maintenance

Correct Answer: C) Physical Design

Explanation: The physical design phase of the SDLC involves converting the logical models developed in earlier stages into actual physical models.

Question 34

 Which type of testing is performed by end users using live data without assistance from developers?

A) Alpha Testing
B) Beta Testing
C) Unit Testing
D) System Testing

Correct Answer: B) Beta Testing

Explanation: Beta testing is performed by end users in a real working environment using live data without assistance from developers.

Question 35

What is the main role of a network administrator?

A) Manage databases
B) Write software programs
C) Oversee computer networks
D) Design websites

Correct Answer: C) Oversee computer networks

Explanation: A network administrator is responsible for managing and maintaining computer networks, ensuring connectivity, and resolving network-related issues.

Question 36

Which component of a CPU retrieves instructions and data to be processed?

A) Arithmetic Logic Unit
B) Control Unit
C) Cache
D) Register

Correct Answer: B) Control Unit

Explanation: The control unit retrieves instructions and data from memory, directing the CPU on how to process them.

Question 37

 Which backup method stores a complete copy of all the data every time it is run?

A) Incremental Backup
B) Differential Backup
C) Full Backup
D) Mirror Backup

Correct Answer: C) Full Backup

Explanation: A full backup creates a complete copy of all data, including system files, every time it is performed.

Question 38

 What does ETL stand for in the context of data processing?

A) Extract, Transform, Load
B) Enter, Transfer, Link
C) Encode, Track, Label
D) Edit, Transfer, Log

Correct Answer: A) Extract, Transform, Load

Explanation: ETL stands for Extract, Transform, Load, which is a process used in data processing to extract data from one source, transform it into the desired format, and load it into the target database.

Question 39

Which method of access control grants or denies access to resources based on roles assigned to users

A) Mandatory Access Control
B) Role-Based Access Control
C) Discretionary Access Control
D) Attribute-Based Access Control

Correct Answer: B) Role-Based Access Control

Explanation: Role-Based Access Control (RBAC) grants or denies access to resources based on the roles assigned to users within an organization.

Question 40

Which of the following is a non-volatile memory?

A) RAM
B) Cache
C) ROM
D) Register

Correct Answer: C) ROM

Explanation: ROM (Read-Only Memory) is a non-volatile memory that retains its contents even when the computer is powered off.

Complete the Captcha to view next question set.

Prev Post
WGU D322 Practice Exam Questions – Set 1 – Part 1
Next Post
WGU D322 Practice Exam Questions – Set 1 – Part 3