OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 6, 2024

Question 21

Which encryption method uses the same key for both encryption and decryption?

A) Public Key Encryption
B) Symmetric Key Encryption
C) Asymmetric Key Encryption
D) Digital Signature

Correct Answer: B) Symmetric Key Encryption

Explanation: In symmetric key encryption, the same key is used for both encrypting and decrypting the data, requiring secure key distribution between parties.

Question 22

Which of the following defines a primary key in a relational database?

A) A unique identifier for each record
B) A key used for encryption
C) A key that links two tables
D) A temporary placeholder for values

Correct Answer: A) A unique identifier for each record

Explanation: The primary key is a unique identifier for each record in a relational database, ensuring that no two records have the same key value.

Question 23

What does ETL stand for in data processing?

A) Extract, Transform, Load
B) Encrypt, Transmit, Load
C) Evaluate, Test, Launch
D) Export, Translate, Log

Correct Answer: A) Extract, Transform, Load

Explanation: ETL stands for Extract, Transform, Load, and it refers to the process of extracting data from sources, transforming it for analysis, and loading it into a final destination.

Question 24

Which network topology connects all devices to a central hub or switch?

A) Bus
B) Star
C) Ring
D) Mesh

Correct Answer: B) Star

Explanation: In a star topology, all devices are connected to a central hub or switch, and communication passes through the central point.

Question 25

What is the function of a database query?

A) Modify data records
B) Retrieve specific information based on criteria
C) Organize data in a database
D) Monitor network traffic

Correct Answer: B) Retrieve specific information based on criteria

Explanation: A database query is used to retrieve specific information from a database, often by applying filters or conditions to the data.

Question 26

Which of the following describes the purpose of RAID (Redundant Array of Independent Disks)?

A) Increase network bandwidth
B) Manage hardware resources
C) Improve data redundancy and performance
D) Encrypt sensitive data

Correct Answer: C) Improve data redundancy and performance

Explanation: RAID is a technology used to improve data redundancy and performance by distributing data across multiple disk drives.

Question 27

Which method of risk management involves reducing the likelihood or impact of a risk?

A) Risk Acceptance
B) Risk Transference
C) Risk Mitigation
D) Risk Avoidance

Correct Answer: C) Risk Mitigation

Explanation: Risk mitigation involves taking steps to reduce the likelihood or impact of a risk, such as by implementing security measures or developing contingency plans.

Question 28

 Which type of programming language is designed to be human-readable and is converted into machine code through a compiler or interpreter?

A) Assembly Language
B) Low-level Language
C) High-level Language
D) Machine Language

Correct Answer: C) High-level Language

Explanation: High-level programming languages are designed to be human-readable, using abstract concepts that are converted into machine code by compilers or interpreters.

Question 29

What is the primary function of the CPU (Central Processing Unit) in a computer system?

A) Store data for long-term use
B) Execute instructions and process data
C) Manage input and output devices
D) Handle network communication

Correct Answer: B) Execute instructions and process data

Explanation: The CPU is the "brain" of the computer, responsible for executing instructions and processing data.

Question 30

Which project management phase involves officially closing the project and delivering the final product?

A) Planning
B) Execution
C) Closing
D) Controlling

Correct Answer: C) Closing

Explanation: The closing phase involves formally ending the project, delivering the final product to the client, and completing any necessary documentation.

Question 31

Which backup type stores only the data that has changed since the last full backup, without referencing other backup types?

A) Full Backup
B) Differential Backup
C) Incremental Backup
D) Continuous Backup

Correct Answer: B) Differential Backup

Explanation: A differential backup captures only the data that has changed since the last full backup, providing a faster recovery time than incremental backups.

Question 32

Which component of the operating system is loaded when the computer first starts up and remains in memory to manage system resources?

A) Shell
B) Kernel
C) Device Driver
D) Bootloader

Correct Answer: B) Kernel

Explanation: The kernel is the core part of the operating system that manages system resources, and it remains in memory after the computer starts up.

Question 33

What does the acronym ROM stand for in computing?

A) Random Output Memory
B) Read-Only Memory
C) Real Operating Mode
D) Random Access Memory

Correct Answer: B) Read-Only Memory

Explanation: ROM (Read-Only Memory) is non-volatile memory used to store firmware and other data that does not change frequently.

Question 34

Which cloud computing model focuses on delivering virtual desktops to users over the internet?

A) SaaS
B) DaaS
C) IaaS
D) PaaS

Correct Answer: B) DaaS

Explanation: Desktop as a Service (DaaS) delivers virtual desktops to users, allowing them to access a complete desktop environment over the internet.

Question 35

Which security measure ensures that data is correct and has not been altered?

A) Confidentiality
B) Availability
C) Integrity
D) Encryption

Correct Answer: C) Integrity

Explanation: Data integrity ensures that information remains accurate and unaltered during transmission or storage, ensuring it is reliable and trustworthy.

Question 36

 Which SQL keyword is used to update existing records in a database table?

A) INSERT
B) DELETE
C) UPDATE
D) SELECT

Correct Answer: C) UPDATE

Explanation: The UPDATE command in SQL is used to modify existing records in a table, allowing changes to be made to the data.

Question 37

What is the primary function of a print server?

A) Manage print jobs on a network
B) Store backup files
C) Encrypt print data
D) Process database queries

Correct Answer: A) Manage print jobs on a network

Explanation: A print server manages and monitors print jobs on a network, allowing multiple users to send documents to shared printers.

Question 38

Which risk management strategy involves accepting the consequences of a risk without taking action to reduce its likelihood or impact?

A) Risk Mitigation
B) Risk Avoidance
C) Risk Acceptance
D) Risk Transference

Correct Answer: C) Risk Acceptance

Explanation: Risk acceptance involves acknowledging the risk and choosing not to take any preventive measures, accepting the consequences if the risk occurs.

Question 39

Which network device is used to connect multiple networks together, directing data based on IP addresses?

A) Switch
B) Hub
C) Router
D) Bridge

Correct Answer: C) Router

Explanation: A router is used to connect different networks together and direct data traffic between them based on IP addresses

Question 40

Which of the following describes a virtual machine (VM)?

A) A physical computer dedicated to running multiple operating systems
B) A program that allows multiple operating systems to run on a single physical machine
C) A network protocol used to connect remote devices
D) A method of encrypting data before transmission

Correct Answer: B) A program that allows multiple operating systems to run on a single physical machine

Explanation: A virtual machine (VM) allows multiple operating systems to run simultaneously on a single physical machine by simulating separate environments.

Complete the Captcha to view next question set.

Prev Post
WGU D332 Practice Exam Questions – Set 3 – Part 1
Next Post
WGU D332 Practice Exam Questions – Set 3 – Part 3