1. What does the acronym “HTML” stand for?
a. HyperText Markup Language
b. High-Level Text Management Language
c. HyperTransfer Markup Language
d. Hyperlink and Text Management Language
Answer: a. HyperText Markup Language
2. Which programming language is commonly used for developing mobile applications?
a. Java
b. C#
c. Swift
d. All of the above
Answer: d. All of the above
3. What is the purpose of a firewall in computer networks?
a. To protect against viruses
b. To monitor network traffic
c. To control access to a network
d. All of the above
Answer: c. To control access to a network
4. What does RAID stand for in the context of data storage?
a. Random Access Integrated Drive
b. Redundant Array of Independent Disks
c. Rapid Access of In-memory Data
d. Remote Authentication and Intrusion Detection
Answer: b. Redundant Array of Independent Disks
5. Which of the following is a popular version control system used by developers?
a. SVN (Subversion)
b. CVS (Concurrent Versions System)
c. Git
d. All of the above
Answer: c. Git
6. What does DNS stand for in the context of networking?
a. Dynamic Network Server
b. Domain Name System
c. Data Networking Service
d. Digital Naming Server
Answer: b. Domain Name System
7. What is the purpose of an operating system?
a. To manage hardware resources
b. To provide a user interface
c. To run applications
d. All of the above
Answer: d. All of the above
8. Which of the following is a programming paradigm that emphasizes the use of objects and classes?
a. Procedural programming
b. Functional programming
c. Object-oriented programming
d. Logical programming
Answer: c. Object-oriented programming
9. What does the acronym “VPN” stand for?
a. Virtual Private Network
b. Very Private Network
c. Virtual Public Network
d. Visible Private Network
Answer: a. Virtual Private Network
10. In the context of cybersecurity, what is phishing?
a. A method of fishing for information online
b. A type of malware
c. A social engineering attack to deceive individuals and obtain sensitive information
d. A hardware vulnerability
Answer: c. A social engineering attack to deceive individuals and obtain sensitive information
11. Which programming language is commonly used for web development on the client-side?
a. Java
b. Python
c. JavaScript
d. Ruby
Answer: c. JavaScript
12. What is the primary function of an SQL database?
a. Storing and managing files
b. Managing network connections
c. Managing and querying relational data
d. Creating graphical user interfaces
Answer: c. Managing and querying relational data
13. What is the purpose of the HTTP protocol?
a. Handling emails
b. Transferring files between computers
c. Retrieving and displaying web pages
d. Securing network communications
Answer: c. Retrieving and displaying web pages
14. Which type of malware is designed to spread from one computer to another without user intervention?
a. Trojan horse
b. Worm
c. Spyware
d. Adware
Answer: b. Worm
15. What does the term “BIOS” stand for in computing?
a. Basic Input Output System
b. Binary Input Output System
c. Basic Integrated Operating System
d. Binary Integrated Operating System
Answer: a. Basic Input Output System
16. Which cloud computing service model provides virtualized computing resources over the internet?
a. Infrastructure as a Service (IaaS)
b. Platform as a Service (PaaS)
c. Software as a Service (SaaS)
d. Database as a Service (DBaaS)
Answer: a. Infrastructure as a Service (IaaS)
17. What is the purpose of a CAPTCHA?
a. To secure email communication
b. To prevent automated bots from accessing a website
c. To encrypt files on a computer
d. To manage database queries
Answer: b. To prevent automated bots from accessing a website
18. Which programming language is often used for data analysis and scientific computing?
a. Java
b. Python
c. C++
d. Ruby
Answer: b. Python
19. What is the function of an IP address in computer networking?
a. Identifying a device on the internet or a local network
b. Managing software installations
c. Controlling access to files
d. Storing user credentials
Answer: a. Identifying a device on the internet or a local network
20. Which encryption protocol is commonly used to secure wireless networks?
a. SSL (Secure Sockets Layer)
b. WPA (Wi-Fi Protected Access)
c. TLS (Transport Layer Security)
d. HTTPS (Hypertext Transfer Protocol Secure)
Answer: b. WPA (Wi-Fi Protected Access)
21. What is the purpose of a cookie in web development?
a. To store data on the client-side
b. To authenticate users
c. To secure server communication
d. To execute server-side scripts
Answer: a. To store data on the client-side
22. Which protocol is commonly used for secure communication over the internet?
a. HTTP (Hypertext Transfer Protocol)
b. FTP (File Transfer Protocol)
c. SSH (Secure Shell)
d. SMTP (Simple Mail Transfer Protocol)
Answer: c. SSH (Secure Shell)
23. What does the term “LAN” stand for in networking?
a. Local Access Network
b. Long Area Network
c. Large Area Network
d. Local Area Network
Answer: d. Local Area Network
24. Which of the following is a popular relational database management system (RDBMS)?
a. MongoDB
b. SQLite
c. Oracle
d. Redis
Answer: c. Oracle
25. What is the role of a router in a computer network?
a. Connects devices within the same local network
b. Connects multiple networks and forwards data between them
c. Manages email communication
d. Stores and retrieves files
Answer: b. Connects multiple networks and forwards data between them
26. Which programming paradigm focuses on the flow of data and the transformation of that data?
a. Object-oriented programming
b. Procedural programming
c. Data-driven programming
d. Functional programming
Answer: c. Data-driven programming
27. What does the term “URL” stand for?
a. Uniform Resource Locator
b. Universal Registration of Links
c. Unified Resource Locator
d. User Recognition Link
Answer: a. Uniform Resource Locator
28. What is the purpose of an antivirus program?
a. To enhance computer performance
b. To monitor network traffic
c. To protect against malicious software (malware)
d. To manage database queries
Answer: c. To protect against malicious software (malware)
29. Which of the following is not a type of cloud deployment model?
a. Public Cloud
b. Private Cloud
c. Hybrid Cloud
d. Encrypted Cloud
Answer: d. Encrypted Cloud
30. What is the primary purpose of a Content Delivery Network (CDN)?
a. To store user credentials securely
b. To distribute content across multiple servers to improve performance and reliability
c. To manage database queries
d. To encrypt network communication
Answer: b. To distribute content across multiple servers to improve performance and reliability
Leave a Reply