- web.groovymark@gmail.com
- November 28, 2024
Question 01
Which backup strategy stores all data and is typically the most time-consuming to complete?
A) Differential Backup
B) Incremental Backup
C) Full Backup
D) Mirror Backup
Correct Answer: C) Full Backup
Explanation: A full backup copies all data from the system, making it the most time-consuming but providing the most comprehensive data recovery option.
Question 02
Which component of the operating system provides a user interface to access system functions?
A) Kernel
B) Shell
C) BIOS
D) Cache
Correct Answer: B) Shell
Explanation: The shell provides a user interface, often allowing command-line or graphical access to interact with the kernel and system functions.
Question 03
What does the acronym SaaS stand for in cloud computing?
A) System as a Service
B) Software as a Service
C) Security as a Service
D) Storage as a Service
Correct Answer: B) Software as a Service
Explanation: SaaS refers to a cloud computing model where software applications are delivered over the internet, often on a subscription basis.
Question 04
Which process in project management involves creating a detailed description of project outcomes and deliverables?
A) Planning
B) Executing
C) Scope Definition
D) Risk Assessment
Correct Answer: C) Scope Definition
Explanation: Scope definition involves clearly outlining the project's objectives, outcomes, and deliverables, ensuring all stakeholders have a shared understanding.
Question 05
Which SQL command is used to remove records from a database table?
A) UPDATE
B) SELECT
C) INSERT
D) DELETE
Correct Answer: D) DELETE
Explanation: The DELETE command is used to remove records from a table in a database, often based on specific conditions.
Question 06
What is the purpose of the DNS in networking?
A) Encrypt data transmissions
B) Convert domain names to IP addresses
C) Manage network bandwidth
D) Control access to shared resources
Correct Answer: B) Convert domain names to IP addresses
Explanation: DNS (Domain Name System) translates human-readable domain names into numerical IP addresses that computers use to identify each other on a network.
Question 07
Which of the following is an advantage of using interpreted languages?
A) Real-time code execution
B) Code optimization before runtime
C) Faster execution than compiled languages
D) No need for debugging
Correct Answer: A) Real-time code execution
Explanation: Interpreted languages execute code in real-time, allowing developers to test and see results immediately without compiling the entire program first.
Question 08
What is the primary role of a firewall in cybersecurity?
A) Protecting physical hardware
B) Managing backup operations
C) Preventing unauthorized access to or from a network
D) Increasing network bandwidth
Correct Answer: C) Preventing unauthorized access to or from a network
Explanation: Firewalls monitor and control incoming and outgoing network traffic, blocking unauthorized access to protect the network.
Question 09
Which of the following is a security protocol that encrypts data during transmission over the internet?
A) SSL/TLS
B) HTTP
C) FTP
D) SMTP
Correct Answer: A) SSL/TLS
Explanation: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols used to encrypt data during transmission, ensuring secure communication over the internet.
Question 10
Which type of system software is responsible for managing the basic functions of a computer, such as file management and memory allocation?
A) Application Software
B) Utility Software
C) Operating System
D) Database Management System
Correct Answer: C) Operating System
Explanation: The operating system manages core functions of the computer, including file management, memory allocation, and input/output operations.
Question 11
What type of programming language translator converts high-level code into machine code one statement at a time?
A) Compiler
B) Assembler
C) Interpreter
D) Linker
Correct Answer: C) Interpreter
Explanation: An interpreter translates high-level code into machine code one line at a time, executing each statement before moving on to the next.
Question 12
Which type of memory is faster and located directly on the processor to speed up access to frequently used data?
A) RAM
B) ROM
C) Cache
D) SSD
Correct Answer: C) Cache
Explanation: Cache memory is faster than RAM and is located closer to the processor to quickly access frequently used data.
Question 13
Which network type is typically used to connect devices in a small geographic area, such as within a building or office?
A) WAN
B) LAN
C) VPN
D) SAN
Correct Answer: B) LAN
Explanation: A LAN (Local Area Network) is used to connect computers and devices within a limited geographic area, such as a single building or office.
Question 14
What is the primary function of a database management system (DBMS)?
A) Manage hardware resources
B) Organize and retrieve data
C) Process network requests
D) Monitor system security
Correct Answer: B) Organize and retrieve data
Explanation: A DBMS is responsible for organizing, retrieving, and managing data in a database, allowing users to query and manipulate data efficiently.
Question 15
Which part of a relational database ensures that each record is unique and identifiable?
A) Foreign Key
B) Primary Key
C) Index
D) Attribute
Correct Answer: B) Primary Key
Explanation: A primary key is a unique identifier for each record in a relational database, ensuring that no two records have the same value in this field.
Question 16
Which cloud computing service provides virtualized computing resources over the internet, such as virtual machines and storage?
A) SaaS
B) IaaS
C) PaaS
D) DaaS
Correct Answer: B) IaaS
Explanation: Infrastructure as a Service (IaaS) provides virtualized computing resources, such as servers, storage, and networking infrastructure, over the cloud.
Question 17
What is the purpose of a proxy server?
A) Store backup files
B) Act as a cache for frequently accessed web pages
C) Encrypt all network traffic
D) Monitor network traffic in real time
Correct Answer: B) Act as a cache for frequently accessed web pages
Explanation: A proxy server caches frequently accessed web pages to reduce loading times and improve performance by serving cached content to users.
Question 18
Which of the following backup methods only captures data that has changed since the last full or incremental backup?
A) Differential Backup
B) Full Backup
C) Incremental Backup
D) Mirror Backup
Correct Answer: C) Incremental Backup
Explanation: Incremental backups only capture data that has changed since the last backup, whether it was a full or incremental backup, saving time and storage space.
Question 19
Which project management phase focuses on continuous monitoring of a project’s performance to ensure it stays on track?
A) Planning
B) Executing
C) Controlling
D) Closing
Correct Answer: C) Controlling
Explanation: The controlling phase of project management involves monitoring and measuring project performance to ensure it stays on track and meets its objectives.
Question 20
Which type of software performs specific tasks for users, such as word processing or spreadsheet creation?
A) Utility Software
B) Application Software
C) Operating System
D) Device Driver
Correct Answer: B) Application Software
Explanation: Application software is designed to perform specific tasks for the user, such as creating documents, managing data, or editing photos.