With each visit, the list of questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1. What is the recommended method for cleaning an optical disc (e.g., CD or DVD)?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2. What ethical principle encourages individuals to be transparent and open about their online actions and intentions?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3. What does CPU stand for?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4. Which Microsoft 365 application is used for project management and task tracking?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5. What is ransomware in the context of computer security?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.A fault in a computer program which prevents it from working correctly is known as
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7. What is a computer virus?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8. Which of the following is an example of a peer-to-peer network?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9. Which input device is often used for medical imaging and radiology?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10. Which of the following is NOT a common email protocol used for sending and receiving email messages?
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11. In macOS, what is the utility used to create and manage compressed archive files?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.The computer size was very large in
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13. What is the primary function of a WAN protocol, such as PPP (Point-to-Point Protocol)?
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14. What is the term for the practice of using someone else's work, ideas, or words without proper attribution or permission?
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15. What component can be upgraded to improve wireless connectivity on a laptop computer?
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16. What is the term for the technique used to create the illusion of depth in VR by rendering objects for each eye separately?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17. What is the primary purpose of a "Mesh Network" in wireless communication?
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.All of the following are examples of real security and privacy risks EXCEPT
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.A normal CD- ROM usually can store up to _________ _data?
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20. What is the primary function of a CPU's memory bus?
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21. Which IoT connectivity technology is often used for short-range communication between mobile devices?
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22. What does "LAN" stand for in the context of networking?
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23. Which type of software allows users to browse the internet and view web pages?
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24. What is the purpose of file indexing in a file system?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25. What is the term for a machine learning model's ability to generalize well to new, unseen data?
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26. Which HTTP status code indicates that the requested resource has been permanently moved to a different URL?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27. What is a "strongly connected component" in a directed graph?
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28. In a desktop environment, what does the "dock" refer to?
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29. What does the term "cloud governance" refer to in cloud computing?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30. What is the purpose of pseudocode in algorithm development?
Your Answer:Correct
Your Answer:Incorrect