Module quiz: Introduction to computers and operating systems Quiz Answers
In this article i am gone to share Module quiz: Introduction to computers and operating systems Quiz Answers with you..
Enroll link: Introduction to Computers and Operating Systems and Security
Introduction to Computers and Operating Systems and Security Week 1 Quiz Answers
Module quiz: Introduction to computers and operating systems Quiz Answers
Question 1)
True or False: Plug-and-play refers to the process of installing a device to a computer by connecting the device and then clicking on a “play” button to activate it.
- True
- False
Question 2)
Imagine that you would like to set up a security feature to prevent unwanted elements from entering your computer system. Which one of the following should you use to accomplish this?
- Denial of Service
- An anti-virus program
- A firewall
Question 3)
Single answer, shuffle
An attack that attempts to overwhelm a system with requests is known as a ________ attack.
- ransomware
- Trojan
- botnet
Question 4)
True or False: An attacker has discovered the password for Sam’s personal email, but it doesn’t work for Sam’s work email. Sam’s work email account is now safe.
- True
- False
Question 5)
Application Software and System Software are examples of _________________.
- Software
- Malware
- Hardware
Question 6)
RAM memory can be said to be ________________.
- non-volatile
- volatile
- terminal
Question 7)
Which part of the CPU contains logic for how the CPU can handle input?
- Registers
- The control unit
- The arithmetic unit
Question 8)
In which of the following interfaces would you type commands in a command prompt or terminal?
- API
- GUI
- CLI
Question 9)
Which of the following are types of operating systems? Select all that apply.
- Patch operating systems.
- Real quick operating systems
- Time-sharing operating systems
- Batch operating systems
- Distributed operating systems
Question 10)
Which of the following are advantages of proprietary software? Select all that apply.
- It is generally less expensive than open-source software.
- It typically has extensive documentation about how to use it.
- Fixes for errors and bugs are usually implemented quickly.
Question 11)
What is a firewall?
- A block or filter that monitors incoming traffic and prevents harmful entities from entering.
- A type of software that prevents an organization from accessing its own applications.
- A digital wall that retains items with much traffic that could potentially trend and go viral.
Question 12)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a ________ attack.
- Trojan
- botnet
- ransomware
Question 13)
Which of the following are examples of non-volatile memory? Select all that apply.
- RAM
- Hard disk drives (HDD)
- USB drives
Question 14)
Which part of the CPU is responsible for receiving a signal?
- Registers
- The control unit
- The arithmetic unit
Question 15)
In computing, which of the following best describes a device driver?
- A program that an OS uses to communicate instructions to a device.
- A set of rules for interacting with a program.
- A hardware component that is required to connect devices to a computer.
Question 16)
An attack that is initiated by tricking the user into clicking a link is known as a ______ attack.
- botnet
- Trojan
- ransomware
Question 17)
You would like to create passwords for multiple accounts. Which approaches can reduce the risk of any of the passwords being figured out? Select all that apply.
- Use a different password for each account.
- Avoid using predictable patterns, like incremental numbering.
- Use long sequences of numbers.
Question 18)
________________ refers to programs that run the hardware on a computer.
- System software
- Malware
- Application software
Question 19)
Which one of the following statements is true?
- The control unit has two parts, which are the CPU and the arithmetic/logic unit.
- The CPU has two parts, which are the control unit and the arithmetic/logic unit.
- The arithmetic/logic unit has two parts, which are the CPU and the control unit.
Question 20)
Which of the following refers to a set of rules for interacting with a program?
- API
- CLI
- GUI
Question 21)
Which type of operating system rotates across tasks in a queue, allocating a fair amount of time to each one?
- Batch operating system
- Time-sharing operating system
- Distributed operating system
Question 22)
Which of the following are advantages of open-source software (OSS)? Select all that apply.
- It typically has extensive documentation about how to use it.
- The source code can be modified by anyone.
- It is available for free.
Question 23)
When interacting with the hardware of a computer, the OS will communicate instructions through a device _____________.
- Registry
- Driver
- Preferences
Question 24)
True or False: The increased number of individuals working from home has complicated the threat landscape.
- True
- False
Question 25)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a ________ attack.
- botnet
- Trojan
- ransomware
Question 26)
________________ refers to specific applications like Microsoft Word or Excel.
- System software
- Application software
- Malware
Question 27)
In which of the following interfaces would you expect to find icons for navigating the system?
- API
- CLI
- GUI
Question 29)
An attacker has obtained the password for Sam’s personal email account and gained access. This password does not apply to Sam’s work email, but the security of that account is still at risk; which of the following is a feasible follow-up action that the attacker might take?
- The attacker can link Sam’s personal email to the work email.
- The attacker can find the password for the work email in the personal email messages.
- The attacker can use Sam’s personal email to impersonate her and request a password reset link for the work account.
Question 30)
Which type of operating system connects several CPUs to execute a task?
- Distributed operating system
- Time-sharing operating system
- Batch operating system