Skip to content

Niyander Tech

Learn with fun

Menu
  • Home
  • Categories
    • Android
    • Alpine.js Components
    • Genshin Impact News
    • Jobs and Internship
    • Coursera Hub
  • Our Policies
    • Privacy Policy
    • Terms and Conditions
    • Contact Us
  • Coursera Search Engine
  • AI Tools
    • AI Background Remover
    • AI Video Downloader
    • 98+ Beautiful CSS Box-Shadow
    • G-Drive Download Link Generator
Menu
Intro to Computers and OS Security Quiz Answers + Review

Intro to Computers and OS Security Quiz Answers + Review

Posted on April 8, 2025April 18, 2025 by Niyander

In this article, I’m simply sharing my thoughts and review of the Intro to Computers and OS Security Quiz Answers.

Just finished the Coursera course “Introduction to Computers and Operating Systems & Security“? In this post, I’m sharing a quick review of the course along with all the quiz answers to help fellow learners. Whether you’re brushing up on tech basics or diving into OS and cybersecurity for the first time, this course offers a solid foundation — and I’ve got your back with the answers! Computers & OS Security Quiz Answers

Table of Contents

  • Module quiz: Introduction to computers and operating systems Quiz Answers
  • Module quiz: Enterprise systems and security Quiz Answers
  • Module quiz: Business systems applications Quiz Answers
  • Course quiz: Introduction to computers and operating systems, and security Quiz Answers
  • My Review of the Intro to Computers and OS Security Quiz Answers

Module quiz: Introduction to computers and operating systems Quiz Answers

Question 1)
True or False: Plug-and-play refers to the process of installing a device to a computer by connecting the device and then clicking on a “play” button to activate it.

  • True
  • False

Question 2)
Imagine that you would like to set up a security feature to prevent unwanted elements from entering your computer system. Which one of the following should you use to accomplish this?

  • Denial of Service
  • An anti-virus program
  • A firewall

Question 3)
Single answer, shuffle
An attack that attempts to overwhelm a system with requests is known as a __ attack.

  • ransomware
  • Trojan
  • botnet

Question 4)
True or False: An attacker has discovered the password for Sam’s personal email, but it doesn’t work for Sam’s work email. Sam’s work email account is now safe.

  • True
  • False

Question 5)
Application Software and System Software are examples of _____.

  • Software
  • Malware
  • Hardware

Question 6)
RAM memory can be said to be ____.

  • non-volatile
  • volatile
  • terminal

Question 7)
Which part of the CPU contains logic for how the CPU can handle input?

  • Registers
  • The control unit
  • The arithmetic unit

Question 8)
In which of the following interfaces would you type commands in a command prompt or terminal?

  • API
  • GUI
  • CLI

Question 9)
Which of the following are types of operating systems? Select all that apply.

  • Patch operating systems.
  • Real quick operating systems
  • Time-sharing operating systems
  • Batch operating systems
  • Distributed operating systems

Question 10)
Which of the following are advantages of proprietary software? Select all that apply.

  • It is generally less expensive than open-source software.
  • It typically has extensive documentation about how to use it.
  • Fixes for errors and bugs are usually implemented quickly.

Question 11)
What is a firewall?

  • A block or filter that monitors incoming traffic and prevents harmful entities from entering.
  • A type of software that prevents an organization from accessing its own applications.
  • A digital wall that retains items with much traffic that could potentially trend and go viral.

Question 12)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a __ attack.

  • Trojan
  • botnet
  • ransomware

Question 13)
Which of the following are examples of non-volatile memory? Select all that apply.

  • RAM
  • Hard disk drives (HDD)
  • USB drives

Question 14)
Which part of the CPU is responsible for receiving a signal?

  • Registers
  • The control unit
  • The arithmetic unit

Question 15)
In computing, which of the following best describes a device driver?

  • A program that an OS uses to communicate instructions to a device.
  • A set of rules for interacting with a program.
  • A hardware component that is required to connect devices to a computer.

Question 16)
An attack that is initiated by tricking the user into clicking a link is known as a __ attack.

  • botnet
  • Trojan
  • ransomware

Question 17)
You would like to create passwords for multiple accounts. Which approaches can reduce the risk of any of the passwords being figured out? Select all that apply.

  • Use a different password for each account.
  • Avoid using predictable patterns, like incremental numbering.
  • Use long sequences of numbers.

Question 18)
____ refers to programs that run the hardware on a computer.

  • System software
  • Malware
  • Application software

Question 19)
Which one of the following statements is true?

  • The control unit has two parts, which are the CPU and the arithmetic/logic unit.
  • The CPU has two parts, which are the control unit and the arithmetic/logic unit.
  • The arithmetic/logic unit has two parts, which are the CPU and the control unit.

Question 20)
Which of the following refers to a set of rules for interacting with a program?

  • API
  • CLI
  • GUI

Question 21)
Which type of operating system rotates across tasks in a queue, allocating a fair amount of time to each one?

  • Batch operating system
  • Time-sharing operating system
  • Distributed operating system

Question 22)
Which of the following are advantages of open-source software (OSS)? Select all that apply.

  • It typically has extensive documentation about how to use it.
  • The source code can be modified by anyone.
  • It is available for free.

Question 23)
When interacting with the hardware of a computer, the OS will communicate instructions through a device _.

  • Registry
  • Driver
  • Preferences

Question 24)
True or False: The increased number of individuals working from home has complicated the threat landscape.

  • True
  • False

Question 25)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a __ attack.

  • botnet
  • Trojan
  • ransomware

Question 26)
____ refers to specific applications like Microsoft Word or Excel.

  • System software
  • Application software
  • Malware

Question 27)
In which of the following interfaces would you expect to find icons for navigating the system?

  • API
  • CLI
  • GUI

Question 29)
An attacker has obtained the password for Sam’s personal email account and gained access. This password does not apply to Sam’s work email, but the security of that account is still at risk; which of the following is a feasible follow-up action that the attacker might take?

  • The attacker can link Sam’s personal email to the work email.
  • The attacker can find the password for the work email in the personal email messages.
  • The attacker can use Sam’s personal email to impersonate her and request a password reset link for the work account.

Question 30)
Which type of operating system connects several CPUs to execute a task?

  • Distributed operating system
  • Time-sharing operating system
  • Batch operating system

Module quiz: Enterprise systems and security Quiz Answers

Question 1)
When a server is said to be ‘down’, which of the following items are retrievable?

  • Files
  • Nothing
  • Directories

Question 2)
Which of the following are means of storing information? Select all that apply.

  • Solid State Drives (SSD)
  • Database Server
  • Application Server

Question 3)
True or False: Scalability is a factor that needs to be considered when deciding upon a backup.

  • True
  • False

Question 4)
Some backup steps that one can take to protect data include _____ , snapshots, and daily backups.

  • Using application servers
  • Replication
  • Mitigations

Question 5)
A distinct difference between personal computing and commercial computing is ______________?

  • Size
  • Location
  • Security

Question 6)
Which computing environment would be considered most scalable?

  • Cloud computing
  • Traditional commercial computing
  • Personal computing

Question 7)
True or False: Zero Standing access is an example of a security policy of reducing access.

  • True
  • False

Question 8)
Updating existing code for security or performance enhancement is called __________?

  • an update
  • a reboot
  • A workaround

Question 9)
True or False: Patches will alter large amounts of code.

  • True
  • False

Question 10)
Which of the following are types of maintenance conducted by a company? Select all that apply.

  • Routine maintenance
  • Corrective maintenance
  • Predictive maintenance

Question 11)
What is meant by the expression ‘The server is down’?

  • The server has been infected with malware.
  • The server is not running or otherwise unreachable.
  • The server is running and responding to requests.

Question 12)
Which one of the following is a means of storing information?

  • An operating system
  • A firewall
  • Solid State Drives (SSD)

Question 13)
Which of the following are desirable backup characteristics? Select all that apply.

  • Availability
  • Durability
  • Transparency

Question 14)
What mitigating steps can you take when protecting your data from unexpected shutdowns or technological failure? Select all that apply.

  • Replication
  • Daily Backups
  • Password protection

Question 15)
Zero Standing access is an example of _______________.

  • An anti-virus software system.
  • A cloud-based pricing policy.
  • A security policy of reducing access.

Question 16)
True or False: Cloud computing is considered more scalable than traditional commercial computing.

  • True
  • False

Question 17)
True or False: Creating daily backups should help secure your data.

  • True
  • False

Question 18)
Cloud computing is considered more ____________ than traditional commercial computing.

  • secure
  • traditional
  • scalable

Question 19)
True or False: Predictive maintenance is maintenance caused by a system ceasing to function.

  • True
  • False

Question 20)
True or False: The expression ‘The Server is Down’ means that content is ready to be accessed.

  • True
  • False

Question 20)
A distinct difference between cloud computing and traditional computing is ______________?

  • Location
  • Business type
  • Security

Question 21)
Which of the following are the reasons for an automatic software update? Select all that apply.

  • To add or improve functionality.
  • To remove bugs from code.
  • To add a security-related element.

Question 22)
What is described in the following statement?
A small piece of code that modifies a target area and does not impact the overall workings of an application.

  • Patch
  • Time-sharing operating systems
  • A software release

Question 23)
What type of maintenance is forced due to an application ceasing to function or displaying an error?

  • Routine Maintenance
  • Corrective maintenance
  • Predictive Maintenance

Question 24)
True or False: A database Server will store information.

  • True
  • False

Question 25)
Which of the following are examples of patch types? Select all that apply.

  • Bug fix patch.
  • A version update patch.
  • A security patch.

Module quiz: Business systems applications Quiz Answers

Question 1)
Which of these statements best define what a business need is?

  • All of the services used in marketing a product.
  • All the requirements included in achieving the money-making aspect of a company.
  • The behind-the-scenes requirements of a business.

Question 2)
True or False: Microsoft Dynamics 365 Project Operation is an example of business software.

  • True
  • False

Question 3)
Which of these email clients is connected to Google Drive for cloud storage?

  • Outlook
  • Gmail
  • Thunderbird

Question 4)
True or False: Cold calling is done with malicious intent.

  • True
  • False

Question 5)
True or False: POP3 is an example of an email protocol.

  • True
  • False

Question 6)
Microsoft 365 is a family of software packages that can be tailored to personal, business, or __________ use.

  • economic
  • educational
  • traditional

Question 7)
_____________ is block-level storage accessed using virtual machines.

  • Azure Managed Disks
  • Azure Blobs
  • Azure Files

Question 8)
In which one of these types of storage would data be more processed?

  • Data warehouse
  • Both are processed equally
  • Data lake

Question 9)
Sam wants to know what customers’ thoughts are on some newly introduced ice cream flavors, so she creates a feedback form on which customers can rate each one on a scale of 1 to 5 stars. What is Sam practicing with this method?

  • Data collection
  • Data analysis
  • Data storage

Question 10)
Why is it important to preprocess data before using it to train a machine learning model?

  • Preprocessing converts data to numbers that the computer can understand.
  • The computer will return an error if the data has not been preprocessed.
  • If the data contains errors, the computer will give poor or inaccurate predictions.

Question 11)
Which of the following items relate to business needs? Select all that apply.

  • Sales
  • Accounting
  • Payroll

Question 12)
Which of the following business applications would be most appropriate for a company with mobile agents?

  • Microsoft Dynamics 365 Field Service
  • Microsoft Dynamics 365 Sales
  • Microsoft Dynamics 365 Customer Service

Question 13)
Which of these email clients is open-source and highly customizable?

  • Thunderbird
  • Gmail
  • Outlook

Question 14)
SMTP is an example of a protocol that _______________.

  • Uploads a user’s email from the client application to the email server.
  • Downloads email from the email server to the client.
  • Directs the email from the sender to the appropriate IP address.

Question 15)
True or False: Azure Blob Storage is suitable for storing streamed data.

  • True
  • False

Question 16)
Sam has sales data from the Sam’s Scoop storefront, as well as sales data from online orders. She would like to combine all this information to get a more complete picture. Which data processing technique should she apply?

  • Data integration
  • Data visualization
  • Data analysis

Question 17)
When preprocessing data to be used for machine learning model, which elements should you identify and remove? Select all that apply.

  • Errors
  • Missing values
  • Information that doesn’t fit with the rest of the data

Question 18)
Which one of the following statements best describes business software?

  • A software application that facilitates a business in administering the various aspects of the business.
  • It is the software that sells the business product.
  • It is industrial standard software.

Question 19)
A data warehouse is similar to a data lake except that the information found there has been _____.

  • Simplified
  • Processed
  • Updated

Question 20)
The process of labeling suspect messages as dangerous and keeping them separate for further investigation is known as _______.

  • Filtering
  • Automatic and continuous virus scanning
  • Quarantining

Question 21)
What is Microsoft 365?

  • A cloud hosting service that offers several options for storage space.
  • A family of software packages that can be tailored for your specific needs.
  • An email server service with integrated security and filtering features.

Question 22)
Consider the following scenario: You want to store streamed data from your security cameras. Which Azure storage option would be the most suitable choice to handle this?

  • Azure Files
  • Azure Blob Storage
  • Azure Managed Disks

Question 23)
Sam has identified an upward sales trend for one of the experimental ice cream flavors at the seaside shop for Sam’s Scoops and would like to present this information to stakeholders. Which data processing technique should she apply?

  • Data analysis
  • Data integration
  • Data visualization

Question 24)
Which of these steps should be taken before training a machine learning model?

  • Collect data
  • Preprocess data
  • Test predictions

Question 25)
True or False: Accounting is considered one of the “business needs”.

  • True
  • False

Question 26)
Which of these email clients supports add-ons such as Microsoft Teams and OneDrive?

  • Outlook
  • Gmail
  • Thunderbird

Question 27)
POP3 is an example of a protocol that ____________.

  • Downloads email from the email server to the client.
  • Directs the email from the sender to the appropriate IP address.
  • Uploads a user’s email from the client application to the email server.

Question 28)
True or False: Data lakes are more processed than data warehouses.

  • True
  • False

Question 29)
True or False: Microsoft 365 is a family of software packages aimed exclusively at large businesses and enterprises.

  • True
  • False

Course quiz: Introduction to computers and operating systems, and security Quiz Answers

Question 1)
Which computing environment is identity and access management (IAM) most associated with?

  • On-premises commercial computing
  • Cloud-based commercial computing
  • Personal computing

Question 2)
What does the CRM in Microsoft CRM stand for?

  • Customer Relationship Marketing
  • Consumer Reliance Management
  • Customer Relationship Management

Question 3)
Which of the following is a benefit of Azure Managed Disks?

  • It enables sharing of files stored in the cloud.
  • It provides versatile storage options without the need for costly hardware like HDDs and SSDs.
  • It stores large, unstructured objects in containers.

Question 4)
Which of the following is a reason for storing data in a data lake?

  • Future unknown values may be found in the data.
  • It is ready for applying to analytics and extracting reports.
  • The structure and goal of the data is known and well defined.

Question 5)
Which of the following computing environments is likely to have the most hardware?

  • Commercial cloud computing
  • Commercial on-premises computing
  • Personal computing

Question 6)
True or False: Just-in-time (JIT) access is a policy of Zero Standing Access.

  • True
  • False

Question 7)
True or False: A company releases software that it believes to be safe from attack. Shortly after, a shortcoming is discovered and exploited to install ransomware on users’ devices. This is an example of a zero-day exploit.

  • True
  • False

Question 8)
Maintenance that occurs in response to failure is known as ____________ maintenance.

  • Corrective
  • Predictive
  • Routine

Question 9)
True or False: Patches add functionality to code.

  • True
  • False

Question 10)
_________ is when the information gained from data analysis is portrayed in a graphic format, such as a line graph or a bar chart.

  • Data visualization
  • Data storage
  • Data integration

Question 11)
Which of the following are elements of the threat landscape? Select all that apply.

  • The methods of attack used.
  • The potential vulnerabilities of an application.
  • The potential attackers who target vulnerabilities.
  • The impact of an attack.

Question 12)
Which of the following descriptions best defines ransomware?

  • Tricking a user to activate malicious code by clicking on it.
  • Preventing legitimate users’ access to their own files.
  • Automated and repetitive attacks on a system.

Question 13)
Why should you avoid using a single password across multiple accounts?

  • Some services allow for simpler, easier-to-remember passwords than others.
  • If an attacker obtains the password and associated email address, it can be used to access other accounts.
  • It’s easier to remember several short passwords than one long one.

Question 14)
True or False: Non-volatile memory is memory that will persist after the computer is turned off.

  • True
  • False

Question 15)
Which of the following can be used to take input?

  • Keyboard
  • Monitor
  • CPU

Question 16)
Which of the following definitions best describes a distributed operating system?

  • An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.
  • An OS that connects several dispersed CPUs to execute tasks.
  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.

Question 17)
True or False: An operating system is a small piece of code that allows software and hardware to communicate.

  • True
  • False

Question 18)
True or False: iOS is used in mobile devices.

  • True
  • False

Question 19)
True or False: Linux is an example of open-source software.

  • True
  • False

Question 20)
Which of the following is a benefit of machine learning?

  • Machine learning models are well-suited for handling large amounts of data that would take great time and effort to analyze manually.
  • Machine learning models can automatically collect data to analyze.
  • Machine learning models and can detect and automatically correct errors in data.

Question 21)
Which of the following statements defines POP3?

  • A series of predetermined steps a computer uses to achieve a given task.
  • The procedures used to retrieve an email when it has arrived at the correct IP address.
  • A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.

Question 22)
Which of the following email clients uses OneDrive to provide additional cloud storage?

  • Outlook
  • Thunderbird
  • Gmail

Question 23)
Which of the following definitions best describes email spoofing?

  • An unsolicited email offering genuine products or services.
  • A fraudulent email from a supposedly known source like Amazon or the post office.
  • Attempting to hook people and trick them into revealing sensitive information about themselves.

Question 24)
A machine learning model can be trained to recognize elements that are unusual and indicate a potential issue, and trigger an action or alert in response. This describes _________.

  • Computer vision
  • Object detection
  • Anomaly detection

Question 25)
A machine learning model is given many images of a busy street, and eventually it is able to discern between cars, buses, and cyclists. This is an example of _________.

  • Knowledge mining
  • Anomaly detection
  • Object detection

Question 26)
Sam is using Microsoft Teams to host an important video meeting, and her computer is under heavy load. To ease the demand without reducing performance, how might the CPU respond?

  • The CPU will throttle down its clock speed.
  • The CPU will use multi-threading.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.

Question 27)
True or False: Storing data in a data warehouse is a more sophisticated process than storing data in a data lake.

  • True
  • False

Question 28)
Which of the following definitions best describes quarantining?

  • Keeping lists of domains and sites that are either allowed or not allowed through.
  • Monitoring the sender’s profile and only allows reputable sources in.
  • Separating suspect emails for further analysis.

Question 29)
___________is software that helps a company to perform operations relating to the goal of making profit.

  • Hacking Software
  • Business Software
  • Proprietary Software

Question 30)
Business applications originate from___________.

  • Customer relationship management (CRM) systems
  • Enterprise resource planning (ERP)
  • Line-of-business solutions (LOB)

Question 31)
True or False: Identity and access management (IAM) is a cloud-based initiative to protect against hackers.

  • True
  • False

Question 32)
True or False: Microsoft CRM is built on Microsoft’s Power Platform.

  • True
  • False

Question 33)
Which of the following is a massively scalable object store for text and binary data?

  • Azure Blob Storage
  • Azure Files
  • Azure Managed Disks

Question 34)
Select the most appropriate definition for Zero Standing Access.

  • Limiting a user’s range of access.
  • Limiting a user’s access time and scope.
  • Limiting the length of time in which a user can access a domain.

Question 35)
Which of the following statements accurately describe zero-day exploits? Select all that apply.

  • They include the use of ransomware.
  • They concern attacks that have been documented and patched.
  • They are done on previously unknown issues.

Question 36)
Which of the following descriptions best defines a Trojan attack?

  • Tricking a user to activate malicious code by clicking on it.
  • Preventing legitimate users’ access to their own files.
  • Automated and repetitive attacks on a system.

Question 37)
Assuming it is only used for one account, which of these passwords would be the most resistant against an attempted attack?

  • sandiego2016!
  • FjY123
  • HVh#8D!2f7$R

Question 38)
Which of the following are examples of desktop operating systems? Select all that apply.

  • Windows
  • MacOS
  • iOS

Question 39)
Which of these statements are true about machine learning? Select all that apply.

  • Machine learning models are guided by sets of rules called algorithms.
  • After training on a sufficient amount of data, a computer can make predictions about any new data that is added.
  • Machine learning models and can detect and automatically correct errors in data.

Question 40)
Which of the following statements defines Simple Mail Transfer Protocol (SMTP)?

  • A series of predetermined steps a computer uses to achieve a given task.
  • A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.
  • The procedures used to retrieve an email when it has arrived at the correct IP address.

Question 41)
True or False: Anomaly detection is a task that can be achieved by machine learning.

  • True
  • False

Question 42)
True or False: Object detection can be used to identify objects automatically from a picture.

  • True
  • False

Question 43)
Sam is running several applications on her laptop at once, and the temperature of the CPU has gotten quite high. How might the CPU respond to this?

  • The CPU will increase its clock speed.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
  • The CPU will throttle down its clock speed.

Question 44)
Which of the following characteristics suggests that a store is a data warehouse? Select all that apply.

  • Similarly structured data is grouped together.
  • Unordered, random data items.
  • The presence of an index.

Question 45)
True or False: Business software is software that is directly associated with the product the company makes.

  • True
  • False

Question 46)
True or False: Customer relationship management (CRM) systems predate Line-of-business solutions (LOB).

  • True
  • False

Question 47)
Microsoft Customer ______ Management (CRM) is built on Microsoft’s Power Platform.

  • Reliance
  • Relevant
  • Relationship

Question 48)
Which of the following are reasons for storing data in a data warehouse? Select all that apply.

  • The data can act as a single source of truth.
  • It allows one to remove noise from data by filtering and cleaning data.
  • By storing all of the data, users can create different exploratory queries.

Question 49)
True or False: Cloud-based computing requires extensive hardware for a new business.

  • True
  • False

Question 50)
Allowing worker access to limited parts of your business is an example of a _____ policy.

  • Just-in-time (JIT) access
  • Just-enough-access (JEA)
  • 3-2-1 backup strategy

Question 51)
Which of the following best describes a zero-day exploit?

  • A flaw in a system was identified and closed with zero days left of danger.
  • Exploiting a vulnerability not known before the attack.
  • The day an exploit was launched.

Question 52)
Maintenance that is performed according to a preplanned schedule is known as ____________ maintenance.

  • Routine
  • Corrective
  • Predictive

Question 53)
Which of the following reasons might deter one from implementing a patch? Select all that apply.

  • It can fix an issue or flaw.
  • It can break the flow of concentration.
  • It can alter functionality.

Question 54)
_________ relates to combining data that comes from different sources into one common format.

  • Data integration
  • Data storage
  • Data analysis

Question 55)
Which of the following descriptions best define a botnet attack?

  • Automated and repetitive attacks on a system.
  • Preventing legitimate users’ access to their own files.
  • Tricking a user to activate malicious code by clicking on it.

Question 56)
True or False: Basing a password on a meaningful word, like a pet’s name, is safer than using easily-found information like a birthday.

  • True
  • False

Question 57)
A ____________ is a small piece of code that allows messages and instructions to pass between hardware and software components.

  • Operating system
  • Internet of things
  • Device Driver

Question 58)
Which of the following are examples of proprietary software? Select all that apply.

  • Windows
  • MacOS
  • Linux

Question 59)
Which of the following email clients uses Google Drive to provide additional cloud storage?

  • Gmail
  • Outlook
  • Thunderbird

Question 60)
Which of the following definitions best describes customer relationship management software?

  • Software that is designed exclusively to aid product development.
  • Software that facilitates communication between client and customer.
  • Software that is designed to help a company with payroll issues.

Question 61)
Commercial on-premises computing will require more ________ than personal or commercial cloud-based environments.

  • Software
  • Users
  • Hardware

Question 62)
Which of these outcomes can be accomplished with a patch? Select all that apply.

  • Removal of incompatibilities and flaws
  • Additional functionality
  • Mitigation of infection

Question 63)
_________ is the process of getting useful information out of raw data by observing relationships and patterns.

  • Data analysis
  • Data integration
  • Data visualization

Question 64)
True or False: A firewall can remove cyber intruders from your files.

  • True
  • False

Question 65)
Which of the following are examples volatile memory? Select all that apply.

  • Hard Disk Drive
  • RAM
  • Solid State Drive

Question 66)
Which of the following can be used for processing?

  • Keyboard
  • Monitor
  • CPU

Question 67)
Which of the following definitions best describes a time-sharing operating system?

  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
  • An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.
  • An OS that connects several dispersed CPUs to execute tasks.

Question 68)
Which of the following is an example of a mobile operating system?

  • iOS
  • MacOS
  • Windows

Question 69)
______________ is/are an example of trying to elicit information from people by deceiving them.

  • Ads
  • Phishing
  • Email spoofing

Question 70)
Which of the following techniques can be used to detect fraud? Select all that apply.

  • Supervised Learning
  • Object detection
  • Machine Learning

Question 71)
______________ is the practice of isolating suspicious emails.

  • Filtering
  • Quarantining
  • Virus scanning

Question 72)
True or False: Azure Files is used for storing large objects.

  • True
  • False

Question 73)
Which of the following definitions best describes a batch operating system?

  • An OS that connects several dispersed CPUs to execute tasks.
  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
  • An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.

Question 74)
True or False: Machine learning models are guided by sets of rules called algorithms.

  • True
  • False

Question 75)
True or False: Thunderbird is an email client that provides cloud storage as part of the service.

  • True
  • False

Question 76)
A data warehouse is like a data lake except that the information found there has been _____________, so it is easily acceptable.

  • Processed
  • Unindexed
  • Anonymized

Question 77)
Maintenance that is performed when signals suggest that an issue is likely to occur is known as ____________ maintenance.

  • Routine
  • Predictive
  • Corrective

Question 78)
At a physical storefront, you might place a security guard at the entrance to prevent intruders from getting in. For a web business, which of the following would you use to keep unwanted elements out of the system?

  • Spam filter
  • Anti-virus program
  • Firewall

Question 79)
Which of these statements are true about anomaly detection? Select all that apply.

  • It can only be used with images.
  • It can be used in such applications as financial fraud detection and finding indicators of impending engine trouble in a car.
  • It concerns the capability to automatically detect errors or unusual activity in a system.

Question 80)
How might a CPU respond when several applications are open at once, placing a heavy strain on resources? Select all that apply.

  • The CPU will use multi-threading.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
  • The CPU will throttle down its clock speed.

Question 81)
True or False: Data found in a data warehouse is more easily classified.

  • True
  • False

Question 82)
Which of the following are examples of non-volatile memory? Select all that apply:

  • Solid State Drive
  • Hard Disk Drive
  • RAM

Question 83)
Which of the following is an example of open-source software?

  • Linux
  • Windows
  • MacOS

Question 84)
True or False: Quarantining is an effective means of preventing hackers.

  • True
  • False

Question 85)
Which of the following definitions best describes business software?

  • Software that can be used to access a company discreetly.
  • Software that has a special license for use.
  • Software that addresses such needs as financial analysis and growth, customer management and analysis.

Question 86)
Which of the following can be used for output?

  • Keyboard
  • CPU
  • Monitor

Question 87)
True or False: Ads are a type of spam.

  • True
  • False

Question 88)
________ and Access Management (IAM) is a cloud-based security framework.

  • Identity
  • Interest
  • Individual

Question 89)
Which of the following definitions best describes a device driver?

  • An application that facilitates communication between user, hardware and software.
  • An application for taking in user input and executing the commands found in there.
  • A small piece of code that facilitates communication between hardware and software.

You can also read these article: How to Create a Countdown Timer with Alpine.js


My Review of the Intro to Computers and OS Security Quiz Answers

I recently completed the “Introduction to Computers and Operating Systems & Security” course on Coursera, which is part of the Microsoft Cybersecurity Analyst Professional Certificate. This course is a great starting point for anyone curious about cybersecurity or aiming to break into the field with no prior experience.

It’s designed to build foundational knowledge around computer systems, operating systems, enterprise environments, and basic cybersecurity concepts.

The course is divided into four modules, each introducing key components such as hardware, how computers interact with operating systems, the cybersecurity landscape, and different business computing environments.

What I liked most was how beginner-friendly and clearly structured the content was, making it easy to follow even without a technical background. It effectively bridges the gap between basic computer knowledge and the more advanced topics you’ll encounter later in the cybersecurity field. If you’re considering a career in cybersecurity, this course is a helpful first step — and in this blog post, I’ve also included the quiz answers to support fellow learners as they work through the material.

Category: Coursera Hub

Post navigation

← Creating a Dynamic Dropdown Menu using Alpine.js
Intro to Networking and Cloud Computing Quiz Answers + Review →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Notice

Hey guys! Need a Google Drive Direct Download Link Generator? I made a simple tool that does just that. 🚀
Convert any shared Drive link into a direct download link instantly.
Try it out now: https://niyander.com/projects/tools/gdrive/
Let me know your thoughts!

Notice

Hi everyone! I've built a collection of 98+ CSS Box-Shadow Examples for developers and designers! 🎨
Click on any card to copy the shadow — super handy for your projects.
Explore them all here: https://niyander.com/projects/tools/box-shadow/
Hope you find it useful!

Notice

Hey folks! Excited to share my new tool — an All-in-One Social Media Downloader! 📥
Download videos, photos, and audio from TikTok, YouTube, Instagram, Facebook, and more.
Check it out here: https://niyander.com/projects/tools/sm/
Your feedback is welcome!

Notice

Hey friends! I just launched a free AI Background Remover called Panda AI! 🐼
Easily remove backgrounds from images with just one click.
Try it out now: https://niyander.com/projects/tools/bg/
Let me know what you think!

May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Apr    

About

Greetings, Hey i am Niyander, and I hail from India, we strive to impart knowledge and offer assistance to those in need.

  • Alpine.js Components
  • Android
  • Bootstrap
  • Coursera Hub
  • Genshin Impact News
  • Jobs and Internship
  • Uncategorized

Hot Topics

  • Microsoft Azure Data Scientist Associate (DP-100) Quiz Answers + Review
  • Prepare for DP-100: Data Science on Microsoft Azure Exam Answers + Review
  • Genshin Impact Version 5.6 redeem codes
  • More Software Engineering Jobs in Japan for Expats – April 2025 Edition
© 2025 Niyander Tech | Powered by Minimalist Blog WordPress Theme