All Coursera Quiz Answers

Introduction to Computers Course quiz answers

In this article, I will share the quiz answers for the Week 4 Course quiz answers from the “Introduction to Computers” course by Microsoft.


Graded Assignment

Course quiz answers

Question 1)
True or False: Identity and access management (IAM) is a cloud-based initiative to protect against hackers.

  • True
  • False

Question 2)
True or false: Microsoft CRM is built on Microsoft’s Power Platform.

  • True
  • False

Question 3)
Integrated GPUs are generally more powerful and offer better performance than discrete GPUs.

  • True
  • False

Question 4)
Which of the following are reasons for storing data in a data warehouse? Select all that apply:

  • It allows one to remove noise from data by filtering and cleaning data.
  • The data can act as a single source of truth.
  • By storing all of the data, users can create different exploratory queries.

Question 5)
Commercial on-premises computing will require more ________ than personal or commercial cloud-based environments.

  • Hardware
  • Users
  • Software

Question 6)
Select the most appropriate definition for Zero Standing Access.

  • Limiting a user’s access time and scope.
  • Limiting the length of time in which a user can access a domain.
  • Limiting a user’s range of access.

Question 7)
Which of the following statements accurately describe zero-day exploits? Select all that apply:

  • They include the use of ransomware.
  • They are done on previously unknown issues.
  • They concern attacks that have been documented and patched.

Question 8)
Maintenance that is performed according to a preplanned schedule is known as ____________ maintenance.

  • Corrective
  • Predictive
  • Routine

Question 9)
True or false: Patches add functionality to code.

  • True
  • False

Question 10)
_________ relates to combining data that comes from different sources into one common format.

  • Data analysis
  • Data storage
  • Data integration

Question 11)
True or false: A firewall can remove cyber intruders from your files.

  • True
  • False

Question 12)
Which of the following descriptions best defines a Trojan attack?

  • Automated and repetitive attacks on a system.
  • Preventing legitimate users’ access to their own files.
  • Tricking a user to activate malicious code by clicking on it.

Question 13)
Assuming it is only used for one account, which of these passwords would be the most resistant against an attempted attack?

  • HVh#8D!2f7$R
  • sandiego2016!
  • FjY123

Question 14)
Which of the following are examples of non-volatile memory? Select all that apply:

  • Hard Disk Drive
  • Solid State Drive
  • RAM

Question 15)
Which of the following can be used for processing?

  • Keyboard
  • Monitor
  • CPU

Question 16)
Which of the following definitions best describes a Batch Operating System?

  • An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.
  • An OS that connects several dispersed CPUs to execute tasks.
  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.

Question 17)
A ____________ is a small piece of code that allows messages and instructions to pass between hardware and software components.

  • Device Driver
  • Operating system
  • Internet of things

Question 18)
Which of the following are examples of desktop operating systems? Select all that apply:

  • Windows
  • iOS
  • MacOS

Question 19)
True or false: Linux is an example of open-source software.

  • True
  • False

Question 20)
True or false: Machine learning models are guided by sets of rules called algorithms.

  • True
  • False

Question 21)
Which of the following statements defines POP3?

  • A series of predetermined steps a computer uses to achieve a given task.
  • The procedures used to retrieve an email when it has arrived at the That’s correct! IP address.
  • A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.

Question 22)
Which of the following email clients uses Google Driveto provide additional cloud storage?

  • Thunderbird
  • Outlook
  • Gmail

Question 23)
True or false: Ads are a type of spam.

  • True
  • False

Question 24)
True or false: Anomaly detection is a task that can be achieved by machine learning.

  • True
  • False

Question 25)
True or false: Object detection can be used to identify objects automatically from a picture.

  • False
  • True

Question 26)
Sam is using Microsoft Teams to host an important video meeting, and her computer is under heavy load. To ease the demand without reducing performance, how might the CPU respond?

  • The CPU will use multi-threading.
  • The CPU will throttle down its clock speed.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.

Question 27)
True or false: Storing data in a data warehouse is a more sophisticated process than storing data in a data lake.

  • True
  • False

Question 28)
True or false: Quarantining is an effective means of preventing hackers.

  • True
  • False

Question 29)
Which of the following definitions best describes business software?

  • Software that addresses such needs as financial analysis and growth, customer management and analysis.
  • Software that has a special license for use.
  • Software that can be used to access a company discreetly.

Question 30)
True or False: Updating or replacing outdated software is unnecessary to overcome software limitations.

  • False
  • True