All Coursera Quiz Answers

Module quiz: Introduction to computers and operating systems Quiz Answers

In this article i am gone to share Module quiz: Introduction to computers and operating systems Quiz Answers with you..

Enroll link: Introduction to Computers and Operating Systems and Security

Introduction to Computers and Operating Systems and Security Week 1 Quiz Answers


 

Module quiz: Introduction to computers and operating systems Quiz Answers

Question 1)
True or False: Plug-and-play refers to the process of installing a device to a computer by connecting the device and then clicking on a “play” button to activate it.

  • True
  • False

Question 2)
Imagine that you would like to set up a security feature to prevent unwanted elements from entering your computer system. Which one of the following should you use to accomplish this?

  • Denial of Service
  • An anti-virus program
  • A firewall

Question 3)
Single answer, shuffle
An attack that attempts to overwhelm a system with requests is known as a ________ attack.

  • ransomware
  • Trojan
  • botnet

Question 4)
True or False: An attacker has discovered the password for Sam’s personal email, but it doesn’t work for Sam’s work email. Sam’s work email account is now safe.

  • True
  • False

Question 5)
Application Software and System Software are examples of _________________.

  • Software
  • Malware
  • Hardware

Question 6)
RAM memory can be said to be ________________.

  • non-volatile
  • volatile
  • terminal

Question 7)
Which part of the CPU contains logic for how the CPU can handle input?

  • Registers
  • The control unit
  • The arithmetic unit

Question 8)
In which of the following interfaces would you type commands in a command prompt or terminal?

  • API
  • GUI
  • CLI

Question 9)
Which of the following are types of operating systems? Select all that apply.

  • Patch operating systems.
  • Real quick operating systems
  • Time-sharing operating systems
  • Batch operating systems
  • Distributed operating systems

Question 10)
Which of the following are advantages of proprietary software? Select all that apply.

  • It is generally less expensive than open-source software.
  • It typically has extensive documentation about how to use it.
  • Fixes for errors and bugs are usually implemented quickly.

 

Question 11)
What is a firewall?

  • A block or filter that monitors incoming traffic and prevents harmful entities from entering.
  • A type of software that prevents an organization from accessing its own applications.
  • A digital wall that retains items with much traffic that could potentially trend and go viral.

Question 12)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a ________ attack.

  • Trojan
  • botnet
  • ransomware

Question 13)
Which of the following are examples of non-volatile memory? Select all that apply.

  • RAM
  • Hard disk drives (HDD)
  • USB drives

Question 14)
Which part of the CPU is responsible for receiving a signal?

  • Registers
  • The control unit
  • The arithmetic unit

Question 15)
In computing, which of the following best describes a device driver?

  • A program that an OS uses to communicate instructions to a device.
  • A set of rules for interacting with a program.
  • A hardware component that is required to connect devices to a computer.

Question 16)
An attack that is initiated by tricking the user into clicking a link is known as a ______ attack.

  • botnet
  • Trojan
  • ransomware

Question 17)
You would like to create passwords for multiple accounts. Which approaches can reduce the risk of any of the passwords being figured out? Select all that apply.

  • Use a different password for each account.
  • Avoid using predictable patterns, like incremental numbering.
  • Use long sequences of numbers.

Question 18)
________________ refers to programs that run the hardware on a computer.

  • System software
  • Malware
  • Application software

Question 19)
Which one of the following statements is true?

  • The control unit has two parts, which are the CPU and the arithmetic/logic unit.
  • The CPU has two parts, which are the control unit and the arithmetic/logic unit.
  • The arithmetic/logic unit has two parts, which are the CPU and the control unit.

Question 20)
Which of the following refers to a set of rules for interacting with a program?

  • API
  • CLI
  • GUI

Question 21)
Which type of operating system rotates across tasks in a queue, allocating a fair amount of time to each one?

  • Batch operating system
  • Time-sharing operating system
  • Distributed operating system

Question 22)
Which of the following are advantages of open-source software (OSS)? Select all that apply.

  • It typically has extensive documentation about how to use it.
  • The source code can be modified by anyone.
  • It is available for free.

Question 23)
When interacting with the hardware of a computer, the OS will communicate instructions through a device _____________.

  • Registry
  • Driver
  • Preferences

Question 24)
True or False: The increased number of individuals working from home has complicated the threat landscape.

  • True
  • False

Question 25)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a ________ attack.

  • botnet
  • Trojan
  • ransomware

Question 26)
________________ refers to specific applications like Microsoft Word or Excel.

  • System software
  • Application software
  • Malware

Question 27)
In which of the following interfaces would you expect to find icons for navigating the system?

  • API
  • CLI
  • GUI

Question 29)
An attacker has obtained the password for Sam’s personal email account and gained access. This password does not apply to Sam’s work email, but the security of that account is still at risk; which of the following is a feasible follow-up action that the attacker might take?

  • The attacker can link Sam’s personal email to the work email.
  • The attacker can find the password for the work email in the personal email messages.
  • The attacker can use Sam’s personal email to impersonate her and request a password reset link for the work account.

Question 30)
Which type of operating system connects several CPUs to execute a task?

  • Distributed operating system
  • Time-sharing operating system
  • Batch operating system