All Coursera Quiz Answers

Module quiz: Introduction to computers and operating systems Quiz Answers

In this article i am gone to share Module quiz: Introduction to computers and operating systems Quiz Answers with you..

Enroll link: Introduction to Computers and Operating Systems and Security

Introduction to Computers and Operating Systems and Security Week 1 Quizย Answers


 

Module quiz: Introduction to computers and operating systems Quiz Answers

Question 1)
True or False: Plug-and-play refers to the process of installing a device to a computer by connecting the device and then clicking on a โ€œplayโ€ button to activate it.

  • True
  • False

Question 2)
Imagine that you would like to set up a security feature to prevent unwanted elements from entering your computer system. Which one of the following should you use to accomplish this?

  • Denial of Service
  • An anti-virus program
  • A firewall

Question 3)
Single answer, shuffle
An attack that attempts to overwhelm a system with requests is known as a ________ attack.

  • ransomware
  • Trojan
  • botnet

Question 4)
True or False: An attacker has discovered the password for Samโ€™s personal email, but it doesnโ€™t work for Samโ€™s work email. Samโ€™s work email account is now safe.

  • True
  • False

Question 5)
Application Software and System Software are examples of _________________.

  • Software
  • Malware
  • Hardware

Question 6)
RAM memory can be said to be ________________.

  • non-volatile
  • volatile
  • terminal

Question 7)
Which part of the CPU contains logic for how the CPU can handle input?

  • Registers
  • The control unit
  • The arithmetic unit

Question 8)
In which of the following interfaces would you type commands in a command prompt or terminal?

  • API
  • GUI
  • CLI

Question 9)
Which of the following are types of operating systems? Select all that apply.

  • Patch operating systems.
  • Real quick operating systems
  • Time-sharing operating systems
  • Batch operating systems
  • Distributed operating systems

Question 10)
Which of the following are advantages of proprietary software? Select all that apply.

  • It is generally less expensive than open-source software.
  • It typically has extensive documentation about how to use it.
  • Fixes for errors and bugs are usually implemented quickly.

 

Question 11)
What is a firewall?

  • A block or filter that monitors incoming traffic and prevents harmful entities from entering.
  • A type of software that prevents an organization from accessing its own applications.
  • A digital wall that retains items with much traffic that could potentially trend and go viral.

Question 12)
An attack that is intended to disrupt services until a ransom until the attackerโ€™s demands are met is known as a ________ attack.

  • Trojan
  • botnet
  • ransomware

Question 13)
Which of the following are examples of non-volatile memory? Select all that apply.

  • RAM
  • Hard disk drives (HDD)
  • USB drives

Question 14)
Which part of the CPU is responsible for receiving a signal?

  • Registers
  • The control unit
  • The arithmetic unit

Question 15)
In computing, which of the following best describes a device driver?

  • A program that an OS uses to communicate instructions to a device.
  • A set of rules for interacting with a program.
  • A hardware component that is required to connect devices to a computer.

Question 16)
An attack that is initiated by tricking the user into clicking a link is known as a ______ attack.

  • botnet
  • Trojan
  • ransomware

Question 17)
You would like to create passwords for multiple accounts. Which approaches can reduce the risk of any of the passwords being figured out? Select all that apply.

  • Use a different password for each account.
  • Avoid using predictable patterns, like incremental numbering.
  • Use long sequences of numbers.

Question 18)
________________ refers to programs that run the hardware on a computer.

  • System software
  • Malware
  • Application software

Question 19)
Which one of the following statements is true?

  • The control unit has two parts, which are the CPU and the arithmetic/logic unit.
  • The CPU has two parts, which are the control unit and the arithmetic/logic unit.
  • The arithmetic/logic unit has two parts, which are the CPU and the control unit.

Question 20)
Which of the following refers to a set of rules for interacting with a program?

  • API
  • CLI
  • GUI

Question 21)
Which type of operating system rotates across tasks in a queue, allocating a fair amount of time to each one?

  • Batch operating system
  • Time-sharing operating system
  • Distributed operating system

Question 22)
Which of the following are advantages of open-source software (OSS)? Select all that apply.

  • It typically has extensive documentation about how to use it.
  • The source code can be modified by anyone.
  • It is available for free.

Question 23)
When interacting with the hardware of a computer, the OS will communicate instructions through a device _____________.

  • Registry
  • Driver
  • Preferences

Question 24)
True or False: The increased number of individuals working from home has complicated the threat landscape.

  • True
  • False

Question 25)
An attack that is intended to disrupt services until a ransom until the attackerโ€™s demands are met is known as a ________ attack.

  • botnet
  • Trojan
  • ransomware

Question 26)
________________ refers to specific applications like Microsoft Word or Excel.

  • System software
  • Application software
  • Malware

Question 27)
In which of the following interfaces would you expect to find icons for navigating the system?

  • API
  • CLI
  • GUI

Question 29)
An attacker has obtained the password for Samโ€™s personal email account and gained access. This password does not apply to Samโ€™s work email, but the security of that account is still at risk; which of the following is a feasible follow-up action that the attacker might take?

  • The attacker can link Samโ€™s personal email to the work email.
  • The attacker can find the password for the work email in the personal email messages.
  • The attacker can use Samโ€™s personal email to impersonate her and request a password reset link for the work account.

Question 30)
Which type of operating system connects several CPUs to execute a task?

  • Distributed operating system
  • Time-sharing operating system
  • Batch operating system