- web.groovymark@gmail.com
- November 28, 2024
Question 21
Which cloud service model focuses on delivering development tools and environments to developers?
A) SaaS
B) IaaS
C) PaaS
D) DaaS
Correct Answer: C) PaaS
Explanation: Platform as a Service (PaaS) provides developers with the tools and environments necessary to build, test, and deploy applications.
Question 22
Which of the following programming languages is primarily used for artificial intelligence and machine learning?
A) PHP
B) Python
C) JavaScript
D) HTML
Correct Answer: B) Python
Explanation: Python is a versatile programming language widely used in artificial intelligence (AI) and machine learning due to its simplicity and extensive libraries.
Question 23
What is the main purpose of a database index?
A) To ensure data integrity
B) To create relationships between tables
C) To speed up data retrieval
D) To secure the database
Correct Answer: C) To speed up data retrieval
Explanation: A database index improves the speed of data retrieval operations by allowing the database to find records faster.
Question 24
Which of the following describes a hierarchical database?
A) Stores data in a single flat file
B) Organizes data using a tree-like structure with parent-child relationships
C) Uses multiple tables with relationships between them
D) Allows real-time data processing
Correct Answer: B) Organizes data using a tree-like structure with parent-child relationships
Explanation: A hierarchical database organizes data in a tree-like structure, where each record has one parent and possibly multiple children.
Question 25
What is the primary purpose of a network switch?
A) To connect different networks together
B) To route data between different networks
C) To forward data only to the intended recipient
D) To provide wireless access
Correct Answer: C) To forward data only to the intended recipient
Explanation: A network switch forwards data only to the intended recipient within a local network, improving efficiency and security.
Question 26
What is a common advantage of using cloud computing for businesses?
A) Higher upfront costs
B) Enhanced control over physical infrastructure
C) Scalability and flexibility
D) Limited access to resources
Correct Answer: C) Scalability and flexibility
Explanation: Cloud computing offers businesses scalability and flexibility, allowing them to adjust resources according to their needs without investing in physical infrastructure.
Question 27
Which of the following best describes the purpose of encryption?
A) To compress files for storage
B) To secure data by converting it into an unreadable format
C) To delete files permanently
D) To optimize network performance
Correct Answer: B) To secure data by converting it into an unreadable format
Explanation: Encryption is the process of converting data into an unreadable format to protect it from unauthorized access during transmission or storage.
Question 28
Which programming language is considered a compiled language?
A) Python
B) Java
C) PHP
D) JavaScript
Correct Answer: B) Java
Explanation: Java is a compiled language, meaning the code is translated into machine language by a compiler before it can be executed.
Question 29
Which of the following is a command-line interface (CLI) used to communicate with remote servers securely?
A) Telnet
B) SSH
C) FTP
D) HTTP
Correct Answer: B) SSH
Explanation: SSH (Secure Shell) is a command-line interface used to securely communicate with remote servers, encrypting data during transmission.
Question 30
Which type of software license allows users to modify the source code and redistribute it?
A) Proprietary software
B) Freeware
C) Open-source software
D) Shareware
Correct Answer: C) Open-source software
Explanation: Open-source software allows users to access, modify, and redistribute the source code, fostering collaboration and innovation.
Question 31
Which cloud computing service allows businesses to rent infrastructure resources like virtual machines, storage, and networking?
A) SaaS
B) PaaS
C) IaaS
D) DaaS
Correct Answer: C) IaaS
Explanation: Infrastructure as a Service (IaaS) allows businesses to rent computing infrastructure resources, such as virtual machines and storage, over the internet.
Question 32
Which programming concept refers to the practice of reusing code in different parts of a program?
A) Compilation
B) Inheritance
C) Polymorphism
D) Modularization
Correct Answer: D) Modularization
Explanation: Modularization involves dividing a program into separate modules or components that can be reused in different parts of the program, improving efficiency and maintainability.
Question 33
What is the primary difference between a database and a data warehouse?
A) Databases store structured data, while data warehouses store unstructured data
B) Databases are used for day-to-day operations, while data warehouses are used for analytics
C) Databases are limited to a single table, while data warehouses contain multiple tables
D) Databases are used for archiving data, while data warehouses process real-time data
Correct Answer: B) Databases are used for day-to-day operations, while data warehouses are used for analytics
Explanation: Databases are used for day-to-day transactions and operations, while data warehouses store large volumes of data specifically for analysis and reporting.
Question 34
Which type of cyber attack involves tricking a user into providing sensitive information through deceptive emails or websites?
A) Phishing
B) Denial-of-service (DoS) attack
C) SQL injection
D) Man-in-the-middle attack
Correct Answer: A) Phishing
Explanation: Phishing attacks involve tricking users into providing sensitive information, such as passwords or credit card numbers, through deceptive emails or websites.
Question 35
Which technique involves translating the entire program into machine code before execution?
A) Interpreted language
B) Scripting
C) Compiled language
D) Modularization
Correct Answer: C) Compiled language
Explanation: In compiled languages, the entire program is translated into machine code before it is executed, allowing the program to run without further translation.
Question 36
Which type of memory is non-volatile and retains data even when the power is turned off?
A) RAM
B) ROM
C) Cache
D) Buffer
Correct Answer: B) ROM
Explanation: ROM (Read-Only Memory) is non-volatile, meaning it retains its data even when the power is turned off, unlike RAM.
Question 37
What does the term “virtualization” refer to in cloud computing?
A) The process of encrypting data for secure transmission
B) The creation of virtual machines that run on a single physical machine
C) The division of large datasets into smaller chunks for processing
D) The practice of storing data in multiple locations for redundancy
Correct Answer: B) The creation of virtual machines that run on a single physical machine
Explanation: Virtualization in cloud computing refers to creating virtual machines that run on a single physical machine, enabling efficient use of hardware resources.
Question 38
Which of the following refers to a unique value that identifies a record in a database table?
A) Foreign Key
B) Primary Key
C) Index
D) Attribute
Correct Answer: B) Primary Key
Explanation: A primary key is a unique value that identifies a record in a database table, ensuring that no two records have the same identifier.
Question 39
Which network topology connects all devices to a single cable?
A) Star
B) Ring
C) Mesh
D) Bus
Correct Answer: D) Bus
Explanation: In a bus topology, all devices are connected to a single cable that serves as the communication backbone.
Question 40
Which cloud service model provides users with the tools to develop and deploy applications without managing the underlying infrastructure?
A) IaaS
B) PaaS
C) SaaS
D) DaaS
Correct Answer: B) PaaS
Explanation: Platform as a Service (PaaS) provides users with the tools and environments to develop, test, and deploy applications without the need to manage the underlying infrastructure.