Which cloud service model provides ready-to-use business applications over the internet?
A. IaaS
B. SaaS
C. PaaS
D. FaaS
Which of the following is the most important factor when choosing between 32-bit and 64-bit operating systems?
A. The number of CPU cores
B. The amount of installed RAM
C. The display resolution
D. The number of users on the device
Which statement best describes virtualization?
A. Using multiple physical servers for one application
B. Running multiple virtual machines on a single physical system
C. Backing up data to the cloud
D. Installing software updates automatically
Which of the following describes the purpose of a device driver?
A. It translates user input into binary code
B. It allows the OS to communicate with hardware devices
C. It provides antivirus protection
D. It controls network bandwidth
What is the function of a database schema?
A. It contains all data records
B. It defines how the data is organized and related
C. It generates random queries
D. It stores user credentials
Which of the following is an example of an interpreted programming language?
A. C++
B. Java
C. Python
D. Assembly
What does the term โscalabilityโ refer to in IT systems?
A. The ability to change screen resolution
B. The ability to increase performance and resources as needed
C. The ability to compress files
D. The ability to run without internet access
What is the primary benefit of using version control software?
A. It increases CPU clock speed
B. It tracks and manages changes to code
C. It automatically compiles software
D. It installs drivers automatically
What type of memory temporarily holds instructions being processed by the CPU?
A. ROM
B. RAM
C. Flash
D. Cache
Which of the following is the best description of two-factor authentication (2FA)?
A. Using two passwords for login
B. Requiring two different forms of verification
C. Using a complex password only
D. Changing passwords every 30 days
What is the main purpose of a UPS (Uninterruptible Power Supply)?
A. To increase voltage to the PC
B. To maintain power temporarily during an outage
C. To provide faster internet
D. To clean the systemโs files
Which of the following commands is used in Linux to list files in a directory?
A. list
B. show
C. ls
D. dir
Which of these backup strategies creates a duplicate copy of all data each time?
A. Differential backup
B. Incremental backup
C. Full backup
D. Snapshot backup
What is the purpose of encryption?
A. To compress data
B. To ensure that only authorized users can access data
C. To speed up data transfer
D. To store data offline
Which development model delivers small, frequent updates instead of large releases?
A. Waterfall
B. Agile
C. Sequential
D. Traditional
Which of the following storage devices offers the fastest data access speed?
A. HDD
B. Optical disc
C. SSD
D. Tape drive
What is the purpose of an API (Application Programming Interface)?
A. To encrypt user passwords
B. To allow software applications to communicate with each other
C. To install system updates
D. To control system hardware
Which database command is used to remove all data from a table but keep the table structure?
A. DROP
B. DELETE
C. TRUNCATE
D. REMOVE
In cybersecurity, what is the main goal of a โleast privilegeโ policy?
A. To give every user full access
B. To restrict user permissions to only what is necessary
C. To increase user performance
D. To share admin rights among all employees
What does โOpen Source Softwareโ mean?
A. Software that is always free to use
B. Software whose source code is publicly accessible and modifiable
C. Software owned by a single corporation
D. Software that requires internet activation
B
B
B
B
B
C
B
B
B
B
B
C
C
B
B
C
B
C
B
B