CORE MODULE - 01.pdf
Document Details
Uploaded by LaudableSunstone6307
Full Transcript
Computer Hardware & Networking (Easy) 1. What is the difference between IPv4 and IPv6? 6. What is latency? A. IPv4 is faster A. The time taken for a data packet to travel from one...
Computer Hardware & Networking (Easy) 1. What is the difference between IPv4 and IPv6? 6. What is latency? A. IPv4 is faster A. The time taken for a data packet to travel from one point to another B. IPv6 is older B. The error rate of a communication channel C. IPv4 is more secure C. Amount of data that can be transmitted over a D. IPv6 has a larger address space communication channel in a given amount of time ANSWER: D D. The type of network topology ANSWER: A 2. What is the POST method used for? A. Retrieving data from a server 7. What is the difference between TCP and UDP? B. Sending data to a server A. TCP is connection-oriented, UDP is connectionless C. Updating data on a server B. TCP is slower than UDP D. Deleting data from a server C. TCP is unreliable, UDP is reliable ANSWER: B D. TCP is used for video streaming, UDP is used for email 3. What is the purpose of port 110? ANSWER: A A. HTTP B. FTP 8. Which amongst these is a valid Class B IP address? C. POP3 A. 192.168.0.1 D. SMTP B. 10.1.1.1 ANSWER: C C. 172.16.0.1 D. 224.0.0.1 4. What is thermal paste used for? ANSWER: C A. Cooling the CPU B. Protecting against static electricity 9. Which layer of the OSI model is responsible for logical addressing? C. Cleaning the keyboard A. Data Link D. Lubricating moving parts B. Network ANSWER: A C. Transport D. Physical 5. What is the role of a reverse proxy? ANSWER: B A. To monitor outgoing traffic B. To provide access control C. To distribute incoming requests to multiple servers D. To cache web content ANSWER: C Page | 1 10. What is the purpose of disk cleanup? 15. What is the color code standard used for Ethernet cables? A. Creating a backup of the hard drive A. TIA/EIA 568A B. Checking for errors on the hard drive B. EIA/TIA 568B C. Combining fragmented files into contiguous blocks C. Both A and B D. Deleting unnecessary files D. There is no standard color code ANSWER: D ANSWER: C 11. How can you filter events in the Event Viewer? A. By event type, source, and date 16. How do you create a chart in OpenOffice Calc? B. By user account only A. Use the "Data" -> "Chart" menu C. By event description only B. Use the "Insert" -> "Chart" menu D. By event ID only C. Use the "Format" -> "Chart" menu ANSWER: A D. All of the above ANSWER: B 12. What are the two types of firewalls? A. Internal and external 17. What is the purpose of software updates? B. Hardware and software A. To change the operating system C. Public and private B. To improve performance and security D. Static and dynamic C. To increase hardware compatibility ANSWER: B D. To reduce storage space ANSWER: B 13. What is ipconfig? A. A network protocol 18. Which security mechanism ensures that sensitive data B. A network utility to display network configuration is unreadable by unauthorized users? information A. Hashing C. A network topology B. Encryption D. A network device C. Authentication ANSWER: B D. Content Filtering ANSWER: B 14. Which security feature prevents a user from accessing websites that may contain malware or inappropriate content? 19. Which communication method requires both the A. Content Filtering sender and receiver to be active at the same time for data exchange? B. Encryption A. Asynchronous Communication C. Hashing B. Synchronous Communication D. Authentication C. Half-Duplex Communication ANSWER: A D. Full-Duplex Communication ANSWER: B Page | 2 20. What is a repeater? 24. What is the difference between an error event and a warning event? A. A device that directs data packets to their destination A. Error events indicate a critical problem, while warning events indicate a potential issue B. A device that amplifies and regenerates network signals B. Error events are less severe than warning events C. A network device that connects multiple devices C. Error events are always generated by hardware, together while warning events are always generated by software D. A device to convert analog signals to digital signals D. There is no difference between the two ANSWER: B ANSWER: A 21. What does a red exclamation mark icon next to an event typically indicate? 25. What is the purpose of the Event Viewer in A. A successful event troubleshooting computer problems? B. A warning event A. Prevent future problems C. An error event B. Delete unnecessary files D. An informational event C. Fix problems automatically ANSWER: C D. Identify potential causes of issues ANSWER: D 22. Which network security tool can simulate an environment to attract and analyze potential 26. What is the relationship between SMTP and attackers? POP3/IMAP? A. Honeypot A. SMTP and POP3/IMAP are not related B. IDS B. SMTP is a replacement for POP3/IMAP C. Firewall C. SMTP is used for sending emails, while D. VPN POP3/IMAP is used for receiving emails ANSWER: A D. SMTP and POP3/IMAP are used for the same purpose ANSWER: C 23. What are SNMP messages? A. Send, Receive, Acknowledge 27. What is DNS caching? B. Connect, Data, Disconnect A. Compressing DNS data C. Request, Response, Error B. Encrypting DNS traffic D. Get, Set, Trap C. Storing DNS records locally to improve ANSWER: D performance D. Protecting DNS servers from attacks ANSWER: C Page | 3 28. Which network device is used to connect two or more 33. "cd" command in Linux is used for; network segments and reduce collisions? A. Change directory A. Hub B. Copy dictionary B. Bridge C. Create directory C. Router D. Delete directory D. Repeater ANSWER: A ANSWER: B 34. Which class of IP addresses has the default subnet 29. How do we comment in shell script? mask 255.255.0.0? A. # A. Class X B. B. Class B C. ' C. Class C D. // D. Class Y ANSWER: A ANSWER: B 30. What is the range of IP addresses for a Class B 35. What is the NTFS file system? network? A. A file system developed by Apple A. 1.0.0.0 to 126.0.0.0 B. A file system developed by Linux B. 128.0.0.0 to 191.255.255.255 C. A file system developed by Microsoft C. 192.0.0.0 to 223.255.255.255 D. A file system developed by Sony D. 224.0.0.0 to 239.255.255.255 ANSWER: C ANSWER: B 36. What is the purpose of the "Scan for hardware 31. Which service is used to anonymously browse the changes" option in the Device Manager? internet by hiding the user's IP address? A. To uninstall hardware A. DNS B. To fix hardware problems B. DHCP C. To detect newly installed or modified hardware C. Proxy Service D. To update device drivers D. Web Service ANSWER: C ANSWER: C 37. Which port number is used for the SSH protocol? 32. What is a DNS zone? A. 20 A. A collection of DNS records for a specific domain B. 22 B. A DNS server C. 23 C. A geographical region served by a DNS server D. 25 D. A type of DNS record ANSWER: B ANSWER: A Page | 4 38. What does the "cat" command do in Linux? 44. Which layer of the OSI model is responsible for flow control? A. Create a file A. Network B. Append text to a file B. Data Link C. Display the contents of a file C. Transport D. Delete a file D. Session ANSWER: C ANSWER: C 39. What is a database server? 45. What is the Device Manager used for? A. A type of hardware A. Managing files and folders B. A software application B. Managing hardware devices C. A network device C. Managing system processes D. A computer that stores and manages databases D. Managing network connections ANSWER: D ANSWER: B 40. How do you enter a formula in OpenOffice Calc? 46. Which OSI layer is responsible for data formatting A. Click the "Formula" button and translation? B. Start with an equal sign (=) A. Physical C. All of these B. Presentation D. Use the "Formula" menu C. Application 41. ANSWER: B D. Transport 42. What is the disadvantage of POP? ANSWER: B A. Limited email storage B. Slow download speeds 47. What is a ransomware? C. Emails are deleted from the server after download A. Malware that encrypts files and demands a ransom D. Security vulnerabilities to decrypt them ANSWER: C B. A self-replicating program C. A virus that infects executable files 43. The default file extension for a presentation created in D. A type of antivirus software OpenOffice Impress is ANSWER: A A..pptx B..ppt 48. Which protocol is often used as a secure web service? C..odp A. FTP D..pdf B. HTTPS ANSWER: C C. SNMP D. Telnet ANSWER: B Page | 5 49. What is a web server? 54. What is the basic unit of data in OpenOffice Calc? A. A network device A. Worksheet B. A software application B. Cell C. A type of hardware C. Row D. A computer that hosts websites D. Column ANSWER: D ANSWER: B 50. Which method is commonly used to provide stateless 55. Which of the following is an example of communication in web services? asynchronous communication? A. SOAP A. Phone call B. REST B. Instant messaging C. FTP C. Video conference D. SMTP D. Email ANSWER: B ANSWER: D 51. What is encryption? 56. Which protocol is responsible for translating an IP address into a MAC address? A. Converting data into a secret code A. ARP B. Speeding up data transfer B. RARP C. Compressing data C. DNS D. Storing data D. DHCP ANSWER: A ANSWER: A 52. Which VPN type is best suited for a company that wants to securely connect its remote branch offices? 57. Which VPN protocol provides data integrity and confidentiality through encryption? A. Client-to-Site VPN A. L2TP B. Site-to-Site VPN B. OpenVPN C. Intranet VPN C. PPTP D. Extranet VPN D. GRE ANSWER: B ANSWER: B 53. What is disk defragmentation? 58. Which protocol is used by RADIUS for authentication A. Deleting unnecessary files and accounting? B. Combining fragmented files into contiguous blocks A. TCP C. Creating a backup of the hard drive B. UDP D. Checking for errors on the hard drive C. ICMP ANSWER: B D. FTP ANSWER: B Page | 6 59. Which network security device can monitor and 64. Which type of attack involves overwhelming a analyze network traffic to identify potential threats? network with a flood of traffic to disrupt service? A. Firewall A. Phishing B. IDS B. Man-in-the-Middle C. Switch C. SQL Injection D. Router D. Denial of Service (DoS) ANSWER: B ANSWER: D 60. What is the most common type of connector used in 65. Which device allows multiple computers to share a Ethernet cables? single Internet connection? A. RJ-16 A. Hub B. RJ-45 B. Repeater C. BNC C. Router D. USB D. Bridge ANSWER: B ANSWER: C 61. Which technology is used to ensure that data has not 66. What is the function of a load balancer in a network? been altered during transmission? A. To filter traffic A. Encryption B. To distribute traffic across multiple servers B. Hashing C. To amplify signals C. Authentication D. To translate IP addresses D. Phishing ANSWER: B ANSWER: B 67. Why do we use single quotes and double quotes in a 62. What is the primary purpose of a Demilitarized Zone shell script? (DMZ) in network security? A. Single quotes treat all characters literally, while A. To store sensitive data double quotes allow variable expansion B. To isolate public-facing services from the internal B. Single quotes allow variable expansion, while network double quotes treat all characters literally C. To filter email content C. There is no difference between single quotes and double quotes D. To manage network traffic D. Single quotes are used for strings, double quotes ANSWER: B for numbers ANSWER: A 63. What is the function of "chown" command in Linux? A. Change file owner B. Change file permissions C. Change file group D. Change file name ANSWER: A Page | 7 68. What is port 21 used for? 73. Which network device can regenerate a signal to extend its transmission distance? A. HTTPS A. Switch B. FTP B. Router C. SMTP C. Repeater D. DNS D. Hub ANSWER: B ANSWER: C 69. Which device filters traffic between different segments of a network and operates at the Network 74. Which method is used by SOAP to send data over the layer? network? A. Hub A. REST B. Switch B. XML C. Router C. JSON D. Bridge D. HTML ANSWER: C ANSWER: B 70. A thermal paste is used to: 75. What is the difference between a well-known port and a registered port? A. Improve CPU performance A. Well-known ports are assigned by IANA, B. Conduct electricity registered ports are assigned by organizations C. Improve heat transfer between CPU and heatsink B. Well-known ports are for client applications, D. Reduce noise registered ports are for server applications ANSWER: C C. Well-known ports are secure, registered ports are not 71. CPU serves the purpose of: D. There is no difference A. Storing data ANSWER: A B. Inputting data C. Outputting data 76. What is preventive maintenance? D. Processing data A. Repairing a computer after it breaks down ANSWER: D B. Regularly inspecting and maintaining computer hardware C. Upgrading computer components 72. Who can be said to be a hacker? D. Installing new software A. Someone who breaks into computer systems ANSWER: B B. A hardware technician C. A computer programmer D. A network administrator ANSWER: A Page | 8 77. Which type of memory is non-volatile and retains 82. The role of RADIUS in network security is; data though the power is off? A. To provide encryption for data transmissions A. Cache B. To authenticate and authorize users accessing the B. Register network C. ROM C. To filter and block malicious traffic D. RAM D. To resolve IP addresses to MAC addresses ANSWER: C ANSWER: B 78. Which protocol resolves an IP address to a physical 83. SMTP is used for network address? A. Sending emails A. DNS B. Receiving emails B. SNMP C. Storing emails C. ARP D. Filtering emails D. RARP ANSWER: A ANSWER: C 84. What is the Event Viewer used for? 79. How does a firewall protect a network? A. Viewing system events and errors A. By monitoring user activity B. Managing hardware devices B. By blocking all incoming traffic C. Creating system restore points C. By allowing all outgoing traffic D. Monitoring network activity D. By filtering network traffic ANSWER: A ANSWER: D 85. FTP active mode is 80. What is FTP used for? A. A mode where the data connection is initiated by A. Managing network devices the server B. Sending emails B. A mode where the data connection is initiated by the client C. Transferring files between computers C. A mode where no data connection is established D. Browsing the web D. A mode where data is transferred without ANSWER: C encryption ANSWER: B 81. Cable management is important for: A. Better aesthetics 86. Which class of IP addresses is used for large networks B. Reducing noise and can have over 16 million hosts? C. Improving airflow A. Class A D. All of these B. Class X ANSWER: D C. Class C D. Class Y ANSWER: A Page | 9 87. Disk Management is primarily used for 92. Which class of IP addresses is typically used for small networks with up to 254 hosts? A. Managing files and folders A. Class A B. Managing hardware devices B. Class X C. Managing system processes C. Class C D. Managing network connections D. Class B ANSWER: A ANSWER: C 88. A power supply unit (PSU) converts: 93. A software license grants: A. DC power to AC power A. The right to modify the software B. Data to information B. Permission to use the software C. AC power to DC power C. Ownership of the software D. Digital signals to analog signals D. All of these ANSWER: C ANSWER: B 89. When removing a CPU cooler, it's important to: 94. Which component stores the BIOS? A. Remove the motherboard first A. ROM B. Avoid touching the CPU core B. HDD C. Use excessive force C. SSD D. Apply pressure evenly D. RAM ANSWER: B ANSWER: A 90. What device is used to connect devices within a single network segment? 95. Which unit is used to measure the speed of CPU: A. Hub A. Hertz B. Switch B. Bytes C. Router C. Bits D. Modem D. Watts ANSWER: B ANSWER: A 91. Which class of IP addresses is used for multicast 96. What is a CLI? groups? A. A graphical interface for interacting with a A. Class X computer B. Class Y B. A text-based interface for interacting with a computer C. Class A C. A programming language D. Class D D. A type of hardware ANSWER: D ANSWER: B Page | 10 97. How does SNMP work? 102. What is a file virus? A. By using a manager-agent model A. A virus that infects executable files B. By using a cool server model B. A virus that infects the boot sector C. By using a peer-to-peer model C. A virus that infects email attachments D. By using a hybrid model D. A virus that infects the operating system ANSWER: A ANSWER: A 98. A beta version of software is: 103. What is satellite communication? A. The final, released version A. A type of wireless transmission media B. A preliminary version for testing B. A type of wired transmission media C. A type of malware C. A network device D. An open-source software D. A software application ANSWER: B ANSWER: A 99. What is bandwidth? 104. What is a macro virus? A. The amount of data that can be transmitted over a A. A virus that infects executable files communication channel in a given amount of time B. A type of antivirus software B. The distance between two points on a network C. A virus that infects macro commands in documents C. The number of devices connected to a network D. A hardware component D. The type of network topology ANSWER: C ANSWER: A 105. What is the function of HTTP? 100. The clock speed of a CPU determines: A. Transferring data between web clients and servers A. The amount of data it can process B. Managing email B. The speed at which it can execute instructions C. File transfer C. The amount of memory it can access D. Network address management D. The size of the CPU ANSWER: A ANSWER: B 106. Which storage device is typically the fastest? 101. What is the purpose of the "case" statement in a A. Magnetic Tape shell script? B. Optical Disk Drive (ODD) A. To perform conditional execution based on multiple conditions C. Solid State Drive (SSD) B. To create loops D. Hard Disk Drive (HDD) C. To define functions ANSWER: C D. To manipulate variables ANSWER: A Page | 11 107. When installing RAM, it's crucial to: 112. The device that converts analog signals into digital signals is: A. Use excessive force A. Codec B. Align the notches correctly B. Modem C. Install all RAM sticks in the same slot C. DAC D. Apply thermal paste to the RAM D. Amplifier ANSWER: B ANSWER: B 108. What is a zero-day exploit? 113. Before installing a CPU, it's important to: A. A vulnerability that is unknown to the software vendor A. Apply thermal paste directly to the CPU B. A network protocol B. Check for bent pins C. A type of antivirus software C. Install the RAM first D. A hardware component D. Connect the power supply ANSWER: A ANSWER: B 109. The cooling system in a computer is essential to: 114. Freeware is software that: A. Prevent overheating A. Can be used without payment B. Improve performance B. Requires payment after a trial period C. Reduce noise C. Has a high cost D. Increase storage capacity D. Is only available for specific operating systems ANSWER: A ANSWER: A 110. What is a web server? 115. A driver is: A. A computer that hosts websites A. A type of hardware B. A software application B. A user interface C. A network device C. A software program that controls hardware D. A type of hardware D. A type of operating system ANSWER: A ANSWER: C 111. What is a botnet? 116. Boot sector virus is: A. A type of antivirus software A. A virus that infects the operating system B. A hardware component B. A virus that infects the master boot record C. A network of compromised computers controlled C. A virus that infects executable files by an attacker D. A virus that infects email attachments D. A network protocol ANSWER: B ANSWER: C Page | 12 117. Which class of IP addresses is used for multicast 122. What is a scareware? groups? A. Malware that tries to trick users into buying A. Class X unnecessary software B. Class Y B. A type of antivirus software C. Class A C. A network protocol D. Class D D. A hardware component ANSWER: D ANSWER: A 118. When installing software, it's important to: 123. Which class of IP addresses is typically used for small networks with up to 254 hosts? A. Install all software without considering system requirements A. Class A B. Read and agree to the license agreement B. Class X C. Share the installation file with others C. Class C D. Ignore any prompts or warnings D. Class B ANSWER: B ANSWER: C 119. Which of the following media access methods is 124. The binary system uses which digits? used by Ethernet? A. 1 and 2 A. Token Passing B. 2 and 3 B. CSMA/CD C. 0, 1, 2, and 4 C. Polling D. 0 and 1 D. FDMA ANSWER: D ANSWER: B 125. Proper grounding is essential to prevent: 120. Which component is responsible for converting A. Overheating digital signals to analog signals for display? B. Static electricity damage A. Motherboard C. Software conflicts B. CPU D. Noise C. RAM ANSWER: B D. GPU ANSWER: D 126. What is the default port number for the SMTP protocol? 121. A graphics card is used for: A. 21 A. Storing data B. 20 B. Processing text C. 25 C. Processing images and video D. 110 D. Processing audio ANSWER: C ANSWER: C Page | 13 127. What tools are used for crimping? 132. What is a cryptojacking? A. Crimping tool and wire stripper A. A type of antivirus software B. Screwdriver and pliers B. A network protocol C. Multimeter and cable tester C. Using someone else's computer to mine cryptocurrency D. None of the above D. A hardware component ANSWER: A ANSWER: C 128. What is the RJ-45 connector used for? 133. Which topology is most susceptible to failure? A. Connecting Ethernet cables A. Internet B. Connecting telephone lines B. Star C. Connecting coaxial cables C. Ring D. Connecting fiber optic cables D. Mesh ANSWER: A ANSWER: B 129. When installing a graphics card, it's essential to: 134. A standoff is used to: A. Install the card before the CPU A. Improve CPU cooling B. Use a screwdriver to tighten screws B. Connect cables C. Apply thermal paste to the graphics card C. Secure the motherboard to the case D. Align the PCIe slot correctly D. Reduce noise ANSWER: D ANSWER: C 130. Anti-static wrist straps are used to: 135. What is the purpose of the crossover cable? A. Improve computer performance A. To connect two computers directly B. Connect components to the motherboard B. To connect a computer to a router C. Reduce noise C. To connect a computer to a modem D. Prevent damage to components due to static electricity D. To connect two hubs ANSWER: D ANSWER: A 131. What is the color code for Ethernet cables? 136. A software license grants: A. A standardized pattern of wire colors for easy A. The right to modify the software identification B. Permission to use the software B. A random pattern of wire colors C. Ownership of the software C. No color code is required D. All of these D. The color code depends on the cable length ANSWER: B ANSWER: A Page | 14 137. ROM stands for: 142. When installing software, it's generally recommended to: A. Random Allow Memory A. Disable antivirus software B. Recordable Access Memory B. Close other running programs C. Read Access Memory C. Install multiple software at once D. Read Only Memory D. Ignore system requirements ANSWER: D ANSWER: B 138. What is a WAN? 143. What media access method is used in a Token A. Wore Area Network Ring network? B. Wide Area Network A. CSMA/CD C. Web Any Network B. CSMA/CA D. World Any Network C. Polling ANSWER: A D. Token Passing ANSWER: D 139. Which component acts as the intermediary between the CPU and the main memory? 144. A thermal paste should be: A. Cache A. Thickly applied to the CPU B. Hard disk B. Applied in a thin, even layer C. GPU C. Not used at all D. Motherboard D. Applied to the heatsink ANSWER: A ANSWER: B 140. Malware is: 145. An operating system: A. Malicious software A. Is not essential for computer operation B. A type of hardware B. Manages computer hardware and software C. A computer game C. Is primarily used for gaming D. Beneficial software D. Is an application software ANSWER: A ANSWER: B 141. Which component stores the BIOS? 146. What is a computer virus? A. ROM A. A harmless computer program B. HDD B. A malicious software program that replicates itself C. SSD C. A type of hardware malfunction D. RAM D. A network error ANSWER: A ANSWER: B Page | 15 147. What is the purpose of a boot sector virus? 152. When installing a CPU, it's essential to align: A. Infect the master boot record A. The pins on the CPU with the socket B. Infect email attachments B. The heatsink with the fan C. Infect executable files C. The RAM slots with the CPU D. Infect the operating system D. The power supply connectors with the motherboard ANSWER: A ANSWER: A 148. In which layer of the OSI model do switches operate? 153. Which unit is used to measure the speed of CPU: A. Application A. Hertz B. Data Link B. Bytes C. Network C. Bits D. Transport D. Watts ANSWER: B ANSWER: A 149. What is the function of port 23? 154. Before disassembling a computer, it's crucial to: A. HTTP A. Unplug it from the power source B. FTP B. Open the case immediately C. Telnet C. Remove all software D. SMTP D. Take a picture of the internal components ANSWER: C ANSWER: A 150. How do viruses typically spread? 155. A software update is typically used to: A. Through infected files A. Remove unwanted features B. Through email attachments B. Fix bugs and improve performance C. Through the internet C. Increase hardware requirements D. All of the above D. Reduce software functionality ANSWER: D ANSWER: B 151. What is shareware? 156. Which component is responsible for converting digital data into analog signals for audio output? A. Can be used freely without limitations A. Sound card B. Requires payment after a trial period B. Modem C. Is always free C. Amplifier D. Is only available for specific hardware D. Speaker ANSWER: B ANSWER: A Page | 16 157. A computer virus is a; 162. What is a CLI? A. A type of hardware malfunction A. A graphical interface for interacting with a computer B. A malicious software program that replicates itself B. A text-based interface for interacting with a C. A harmless computer program computer D. A network error C. A programming language ANSWER: B D. A type of hardware 158. What is a mesh topology? ANSWER: B A. A network topology where all devices are connected to a central cable 163. What is a RAM? B. A network topology where devices are connected in a ring A. Roll Access Memory C. A network topology where devices are connected B. Read-Only Memory to a central hub or switch C. Random Access Memory D. A network topology where devices are connected D. Removable Access Memory to multiple other devices ANSWER: C ANSWER: D 164. Which among these can be said to be an example 159. Which type of memory temporarily stores the of a CLI command? data? A. Click on the "Start" button A. ROM B. Type "ls" to list files and directories B. RAM C. Double-click on an icon C. HDD D. Drag and drop a file D. SSD ANSWER: B ANSWER: B 165. The clock speed of a CPU determines: 160. The primary function of a motherboard is: A. The amount of data it can process A. Processing data B. The speed at which it can execute instructions B. Storing data C. The amount of memory it can access C. Connecting computer components D. The size of the CPU D. Displaying output ANSWER: B ANSWER: C 166. A peripheral device is: 161. A case fan is used to: A. An internal component of the computer A. Improve CPU cooling B. An external device connected to the computer B. Increase storage capacity C. A software application C. Enhance graphics performance D. A type of memory D. Improve airflow within the case ANSWER: B ANSWER: D Page | 17 167. Overclocking a CPU means: 172. A software update is often delivered through: A. Reducing its clock speed A. Physical media B. Increasing its clock speed beyond the B. Email manufacturer's specifications C. Online download C. Underclocking the GPU D. Hardware upgrade D. Adding more cores to the CPU ANSWER: C ANSWER: B 173. A driver conflict occurs when: 168. When organizing cables, it's recommended to: A. Two or more drivers are incompatible A. Use zip ties to bundle cables B. The operating system is corrupted B. Leave cables loose for better airflow C. The hardware is faulty C. Hide all cables behind the motherboard D. The software is outdated D. Ignore cable management ANSWER: A ANSWER: A 174. When installing a power supply unit, it's 169. How does SNMP work? important to: A. By using a manager-agent model A. Connect all cables before securing the PSU B. By using a cool server model B. Align the mounting holes correctly C. By using a peer-to-peer model C. Install the PSU before the motherboard D. By using a hybrid model D. Apply thermal paste to the PSU ANSWER: A ANSWER: B 170. A backup is a: 175. A beta version of software is: A. Copy of data for recovery purposes A. The final, released version B. Type of software B. A preliminary version for testing C. Open Source C. A type of malware D. Internet connection D. An open-source software ANSWER: A ANSWER: B 171. A heat sink is used to: 176. Which of the following is a GUI element? A. Increase CPU performance A. Command prompt B. Reduce noise B. Icon C. Dissipate heat from the CPU C. CLI D. Store data D. Terminal ANSWER: C ANSWER: B Page | 18 177. A software suite is a collection of: 181. When uninstalling software, it's important to: A. Hardware components A. Delete the software folder manually B. Related software applications B. Use the operating system's uninstaller C. Drivers C. Restart the computer before uninstalling D. Operating systems D. Ignore any prompts or warnings ANSWER: B ANSWER: B 178. What is a window manager? 182. What is the characteristic of UDP? A. A software application that controls the placement A. Connectionless and appearance of windows B. Reliable B. A hardware component that manages the display C. Ordered delivery C. A type of input device D. Error checking D. A network protocol ANSWER: A ANSWER: A 183. After assembling a computer, it's crucial to: 179. What is a widget? A. Immediately turn it on A. A small graphical element that performs a specific B. Check for loose components function C. Ignore the power supply B. A type of software application D. Install all software C. A hardware component ANSWER: B D. A network protocol ANSWER: A 180. What is bandwidth? A. The amount of data that can be transmitted over a communication channel in a given amount of time B. The distance between two points on a network C. The number of devices connected to a network D. The type of network topology ANSWER: A Page | 19 Medium 184. When is UDP used? 189. A rollback is used to: A. For real-time applications like video streaming A. Restore a system to a previous state B. For file transfer B. Upgrade the operating system C. For email C. Install new software D. For secure data transmission D. Increase system performance ANSWER: A ANSWER: A 185. What is TCP/IP? 190. What port is used by the FTP protocol for data transfer? A. A type of hardware A. 20 B. A software application B. 27 C. A network topology C. 23 D. A suite of protocols used for internet communication D. 25 ANSWER: D ANSWER: A 186. What is POP? 191. It's generally recommended to create a system restore point before: A. Post Office Protocol A. Installing new hardware B. Public Only Protocol B. Installing new software C. Private Office Protocol C. Making significant system changes D. Personal Office Protocol D. All of these ANSWER: A ANSWER: D 187. A software patch is used to: 192. What is the advantage of UDP over TCP? A. Add new features A. Faster B. Fix minor software issues B. More reliable C. Completely reinstall software C. Better error checking D. Remove unwanted programs D. More secure ANSWER: B ANSWER: A 188. Open-source software is: A. Always free B. Has limited functionality C. Cannot be modified D. Has publicly accessible source code ANSWER: D Page | 20 193. The difference between full installation and 197. What is the difference between a major and minor custom installation is; software update? A. Full installation installs all components, while A. Major updates adds new features, while minor custom allows selecting specific features. updates fix bugs and improve performance. B. Full installation is faster, while custom is slower. B. Major updates are paid, while minor updates are free. C. Full installation requires more disk space, while custom requires less. C. Major updates require a complete reinstallation, while minor updates do not. D. There is no difference between the two. D. There is no difference between the two. ANSWER: A ANSWER: A 194. What is the function of "while" loop in a shell script? 198. What is the purpose of the "ls" command in Linux? A. To perform conditional execution A. List files and directories B. To create loops B. Create a file C. To define functions C. Copy a file D. To manipulate variables D. Delete a file ANSWER: B ANSWER: A 195. What is a shell? 199. Which of these is a Linux distribution? A. A hardware component A. Windows B. A software application that provides a CLI interface B. macOS C. A programming language C. Ubuntu D. A network protocol D. Microsoft Office ANSWER: B ANSWER: C 196. What is a silent installation? 200. What is the function of POP? A. An installation that requires no user interaction. A. Retrieving emails from a mail server B. An installation that is very quiet. B. Sending emails C. An installation that does not require administrative C. Managing email accounts privileges. D. Filtering spam D. An installation that installs only essential files. ANSWER: A ANSWER: A 201. What is a process? A. A running instance of a program B. A type of hardware C. A file system D. A network protocol ANSWER: A Page | 21 202. How do you assign a value to a variable in a shell 207. What is IMAP4rev1? script? A. An updated version of IMAP with improved A. Using '=' operator features B. Using 'let' keyword B. A security protocol for IMAP C. Using 'declare' keyword C. A compression method for IMAP D. Using 'set' command D. A type of IMAP client ANSWER: A ANSWER: A 203. What is the function of "cp" command in Linux? 208. What is a template in Word? A. Copy files or directories A. A pre-formatted document that can be used as a starting point B. Create files or directories B. A type of chart D. Compare files C. A formula for calculating values D. Delete files or directories D. A data validation rule ANSWER: A ANSWER: A 204. How does IMAP differ from POP3? 209. What is the function of the "mv" command in A. IMAP allows multiple devices to access emails Linux? simultaneously A. Move or rename files or directories B. IMAP downloads emails to the client B. Modify files or directories C. IMAP is faster than POP3 C. Make a copy of files or directories D. IMAP is less secure than POP3 D. Delete files or directories ANSWER: A ANSWER: A 205. What is a kernel in an operating system? 210. What is a presentation? A. The core component that manages hardware and software A. A collection of slides containing text, images, and multimedia B. A user interface B. A document containing text and images C. A type of application software C. A spreadsheet with data D. A network protocol D. A database for storing information ANSWER: A ANSWER: A 206. What is a shell script? 211. What purpose does the "mkdir" command fulfil in A. A graphical user interface script Linux? B. A text-based program that runs in a shell A. Make directory environment B. Move directory C. A programming language C. Modify directory D. A type of hardware D. Delete directory ANSWER: B ANSWER: A Page | 22 212. What is the function of Microsoft Word? 217. What is spreadsheet? A. Creating spreadsheets A. A document containing text and images B. Creating presentations B. A table of organized data C. Creating documents C. A presentation with slides D. Managing databases D. A database for storing information ANSWER: C ANSWER: B 213. What is database management system (DBMS)? 218. What is the difference between a dial-up and broadband connection? A. Software for creating, managing, and accessing databases A. Dial-up is slower and uses a phone line, while broadband is faster and uses various technologies B. A type of hardware B. Dial-up is faster and uses a phone line, while C. A programming language broadband is slower and uses various technologies D. A network protocol C. There is no difference between dial-up and ANSWER: A broadband D. Dial-up is used for wired connections, while 214. What is a fiber optic cable? broadband is used for wireless connections A. A type of wired transmission media ANSWER: A B. A type of wireless transmission media C. A network device 219. What is a chart in a spreadsheet? D. A software application A. A graphical representation of data ANSWER: A B. A formula for calculating values C. A database table 215. What is the purpose of the "for" loop in a shell D. A text format script? ANSWER: A A. To perform conditional execution B. To create loops 220. What is the purpose of the "grep" command in a C. To define functions shell script? D. To manipulate variables A. To search for text patterns in files ANSWER: B B. To create files C. To modify file permissions 216. How do ISPs provide internet access? D. To change file ownership A. Through dial-up, DSL, cable, fiber optic, and ANSWER: A satellite connections B. Only through Wi-Fi 221. What is a database? C. Exclusively through Ethernet cables A. A collection of organized information D. By using only cellular networks B. A type of software application ANSWER: A C. A hardware component D. A network protocol ANSWER: A Page | 23 222. What is a variable in a shell script? 227. What is broadband internet? A. A named storage location for data A. A high-speed internet connection B. A keyword B. A low-speed internet connection C. A function C. A type of wireless connection D. A control structure D. A type of wired connection ANSWER: A ANSWER: A 223. What is the function of Microsoft Excel? 228. Which office suite is most widely used? A. Creating spreadsheets A. LibreOffice B. Creating presentations B. Microsoft Office C. Creating documents C. Google Docs D. Managing databases D. Apple iWork ANSWER: A ANSWER: B 224. What is the purpose of the "case" statement in a 229. What is the primary function of Microsoft shell script? PowerPoint? A. To perform conditional execution based on A. Creating spreadsheets multiple conditions B. Creating presentations B. To create loops C. Creating documents C. To define functions D. Managing databases D. To manipulate variables ANSWER: B ANSWER: A 230. What is a pivot table in OpenOffice Calc? 225. What is a software dependency? A. A type of chart A. A requirement for specific hardware components. B. A way to summarize and analyze data B. A requirement for other software to function C. A formula for calculating values correctly. D. A database function C. A need for internet connection during installation. ANSWER: B D. A limitation on the number of users. ANSWER: B 231. What is soft link in Linux? A. A physical copy of a file 226. What is the purpose of a software registry? B. A pointer to another file A. Stores user preferences and settings C. A type of hardware device B. Manages hardware drivers D. A network protocol C. Controls the operating system ANSWER: B D. All of these ANSWER: A Page | 24 232. What does the "exit" command do in a shell 237. What is a database relationship? script? A. A connection between two tables based on a A. Terminates the script execution common field B. Displays a message B. A formula for calculating values C. Performs the arithmetic operations C. A chart type D. Creates a loop D. A report format ANSWER: A ANSWER: A 233. What is a function in a shell script? 238. What is macro in Excel? A. A reusable block of code A. A pre-defined formula B. A variable B. A recorded series of actions that can be automated C. A control structure C. A chart type D. A command D. A data validation rule ANSWER: A ANSWER: B 234. What is the difference between HTTP and 239. What is the "sudo" command in Linux? HTTPS? A. To switch users A. HTTPS uses encryption, HTTP does not B. To execute commands with superuser privileges B. HTTP is faster than HTTPS C. To edit files C. HTTP is used for email, HTTPS is used for web D. To create directories browsing ANSWER: B D. There is no difference ANSWER: A 240. What is a package manager in Linux? A. A software tool for installing, managing, and 235. What is a mail merge in Word? removing software packages A. Combining a document template with a data source B. A type of hardware to create personalized documents C. A programming language B. Sending an email from within Word D. A network protocol C. Merging multiple documents into one ANSWER: A D. Formatting text in a specific style ANSWER: A 241. What is a slide master in PowerPoint? A. A predefined layout for slides 236. What is a Linux distribution? B. A special type of chart A. A type of hardware C. A sound effect B. A programming language D. A transition effect C. A complete operating system based on the Linux kernel ANSWER: A D. A network protocol ANSWER: C Page | 25 242. A chipset is: 247. What is the default file extension for a document created in OpenOffice Writer? A. A type of software A..docx B. A group of integrated circuits on the motherboard B..doc C. A cooling device C..odt D. A storage device D..txt ANSWER: B ANSWER: C 243. What is a process ID (PID)? 248. What does the "chmod" command do in Linux? A. An unique identifier for a running process A. Change file owner B. A file permission B. Change file permissions C. A network port number C. Change file group D. A hardware address D. Change file name ANSWER: A ANSWER: B 244. What is a query in a database? 249. What is OpenOffice? A. A request for information from a database A. A web browser B. A table in a database B. An operating system C. A record in a database C. A free and open-source office suite D. A field in a database D. A programming language ANSWER: A ANSWER: C 245. What is a user group in Linux? 250. What is a device driver? A. A collection of users with similar privileges A. A software program that allows the operating B. A physical group of people system to communicate with hardware C. A software application B. A type of hardware component D. A hardware component C. A file system ANSWER: A D. A network protocol ANSWER: A 246. What is a file permission in Linux? A. Controls who can access and modify a file 251. What does the "trap" command do in shell script? B. Determines the file size A. To handle signals and errors C. Specifies the file type B. To create functions D. Indicates the file creation date C. To perform arithmetic operations ANSWER: A D. To control the flow of the script ANSWER: A Page | 26 252. What is a pivot table in Excel? 257. What is the purpose of the "eval" command in a shell script? A. A chart type A. To evaluate an expression B. A data analysis tool for summarizing and organizing data B. To create a function C. A formula for calculating values C. To handle signals D. A database function D. To change the working directory ANSWER: B ANSWER: A 253. How do you open the Device Manager in 258. The expansion slots on a motherboard are used to: Windows? A. Install additional memory A. Right-click the Start button and select "Device B. Install expansion cards Manager" C. Connect cables B. Open the Control Panel and select "Device Manager" D. Secure the CPU C. Both A and B ANSWER: B D. None of these ANSWER: C 259. How do you insert a picture into OpenOffice Draw? A. Use the "Insert" -> "Picture" menu 254. What is the purpose of the "awk" command in a shell script? B. Copy and paste the picture A. Text processing and pattern matching C. Drag and drop the picture B. Creating files D. All of the above C. Modifying file permissions ANSWER: D D. Changing file ownership ANSWER: A 260. BIOS is the acronym for: A. Basic Input Output System 255. What is a pivot chart in Excel? B. Binary Input Output System A. A graphical representation of pivot table data C. Built-in Input Output System B. A type of chart D. Basic Internal Output System C. A formula for calculating values ANSWER: A D. A data validation rule ANSWER: A 261. What is a modem? A. A device that modulates and demodulates signals for data transmission 256. What is a database query language? B. A network device that connects multiple devices A. A language used to interact with and manipulate together databases C. A device that amplifies network signals B. A programming language D. A device that converts digital signals to analog C. A scripting language signals D. A markup language ANSWER: A ANSWER: A Page | 27 262. What is the purpose of the "xargs" command in a 267. What is SNMPv3? shell script? A. The latest version of SNMP with improved A. Builds command lines from standard input security B. Creating files B. An older version of SNMP C. Modifying file permissions C. A specific type of SNMP message D. Changing file ownership D. A network management tool ANSWER: A ANSWER: A 263. What is the purpose of the "test" command or the 268. What is the purpose of the "return" statement in a square brackets [ ] in a shell script? shell script function? A. To perform arithmetic operations A. To return a value from the function B. To create functions B. To exit the script C. To test conditions and make decisions C. To create a loop D. To handle signals D. To handle signals ANSWER: C ANSWER: A 264. What is a hub? 269. Which of the following is NOT a core component of OpenOffice? A. A network device that connects multiple devices together A. Writer B. A device that directs data packets to their B. Excel destination C. Calc C. A device that amplifies network signals D. Impress D. A device to convert analog signals to digital ANSWER: B signals ANSWER: A 270. What is DHCP? A. Dynamic Host Configuration Protocol 265. What is OpenOffice Draw primarily used for? B. Digital Host Configuration Protocol A. Creating text documents C. Dynamic Host Control Protocol B. Creating spreadsheets D. Distributed Host Control Protocol C. Creating presentations ANSWER: A D. Creating diagrams and illustrations ANSWER: D 271. What is a relative cell reference in OpenOffice Calc? 266. What is a conditional formatting in Excel? A. A cell reference that changes when a formula is A. Applying specific formatting based on certain copied conditions B. A cell reference that remains constant when a B. A chart type formula is copied C. A formula for calculating values C. A type of chart D. A data validation rule D. A data validation rule ANSWER: A ANSWER: A Page | 28 272. What is the purpose of the "here document" ( "Slide Show" menu C. To assign IP addresses to devices D. All of these D. To route data packets to the destination ANSWER: D ANSWER: B 542. Which OSI layer is responsible for the 547. Which type of attack involves intercepting and transmission of raw bit streams over a physical altering communication between two parties? medium? A. Brute Force A. Application B. Denial of Service (DoS) B. Physical C. Man-in-the-Middle C. Network D. Phishing D. Transport ANSWER: C ANSWER: B 548. What device converts digital signals to analog 543. Which of the following is a RESTful web service signals and vice versa for communication over method? telephone lines? A. CONNECT A. Switch B. POST B. Modem C. REPEAT C. Router D. TRACE D. Bridge ANSWER: B ANSWER: B Page | 57 549. What is IP? A. Internet Protocol B. Internal Protocol C. Integrated Protocol D. Internet Program ANSWER: A Page | 58