q
Which of the following is not a function of the operating system?
Create and edit a spreadsheet
An organization's IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
DDoS
Which of the following is an example of application software?
Word
Which of the following language is used to write web pages?
HTML
What are the main components of the CPU?
Hard Disk, RAM, and Motherboard
Device drivers are:
Necessary for hardware to communicate with the operating system
What is the role of the BIOS in ROM when the computer is turned on?
Test all the hardware and locate and load the operating system into the main memory
Which of the following statements is true about registers?
They are high-speed memory areas used to perform operations on data.
When describing malware, what is a difference between a virus and a worm?
A virus replicates itself by attaching to another file, whereas a worm can replicate itself to different computers in the network
___ is the process of copying all the critical data from all devices, endpoints, and nodes and transmitting it to a server.
Backup
___ controls the working of RAM
CPU
Which type of memory is used to store frequently used data and instructions to speed up the CPU?
Cache
the following is system software
Compiler Operating system Utilities
Which of the following is a type of system software?
Device driver
What does the CU do in the CPU?
Directs ALU, input/output devices, and the memory
Which is not an application software?
Driver
Mesh topology do all the computers connect with the help of a central unit.
False
A ___ broadcasts all the received messages
Hub
Which topology combines two or more than two topologies?
Hybrid
What is the best way to avoid getting spyware on a machine?
Install software only from trusted websites
Which type of malware is designed to secretly monitor and record keystrokes on a computer or device?
Keylogger
In which topology the network consists direct link between two computers?
Mesh
Which toplogy has the highest installation cost?
Mesh
Utility software is designed to:
Perform specific tasks that enhance and support the overall functionality of a computer system
In which type a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
Phishing
The BIOS (Basic Input Output System) is typically stored in:
ROM
The Basic Input Output System (BIOS) resides in
ROM
Which memory is used to store data permanently and cannot be easily modified?
ROM
Which type of malware encrypts a victim's files and demands a ransom for their release?
Ransomware
Which memory is known for being the fastest, smallest, and closest to the CPU?
Registers
____signifies the ability of a network to minimize the scope and frequency of network incidents, continue operations while under pressure and recover as quickly as possible.
Reliability
What type of memory is used to permanently store data and has a high storage capacity compared to RAM?
Secondary Storage
Which type of software is specifically designed to help manage and control computer hardware?
System software
Which of the following is a function of the CPU?
erform arithmetic calculations and logical operations