Q61
Q61 What is the binary equivalent of the IP address 192.168.0.1?
11000000.10101000.00000000.00000001
11111111.11111111.11111111.11111111
10101010.01010101.10101010.01010101
00000000.00000000.00000000.00000000
Q62
Q62 Convert the binary MAC address 11001100:10101010:11110000:11001100:10101010:11110000 to its hexadecimal equivalent.
192.168.0.1
192.168.1.1
255.255.255.0
10.0.0.1
Q63
Q63 A user is unable to connect to the internet.
Which of the following is the first step in troubleshooting the issue?
Check the network cables
Replace the computer
Uninstall the operating system
Format the hard drive
Q64
Q64 A network administrator notices that the network is experiencing high latency.
What could be a possible cause?
Heavy network traffic
Incorrect IP configuration
Hardware failure
Malware infection
Q65
Q65 A company's internal network is experiencing frequent security breaches.
Which of the following measures is most effective in securing the network?
Install antivirus software
Use strong firewalls and encryption
Limit employee internet usage
Disable all network access
Q66
Q66 What is the primary purpose of a Database Management System (DBMS)?
To create graphics
To manage data in a structured way
To connect to the internet
To perform calculations
Q67
Q67 Which of the following is a characteristic of a relational database?
Data is stored in files
Data is stored in tables with rows and columns
Data is stored in a hierarchy
Data is stored in a flat format
Q68
Q68 What does SQL stand for?
Structured Query Language
Sequential Query Language
Structured Quality Language
Standard Query Language
Q69
Q69 What is the purpose of the primary key in a database table?
To perform calculations
To uniquely identify each record in the table
To store large amounts of data
To manage user access
Q70
Q70 Which of the following is used to retrieve data from a database?
UPDATE
SELECT
INSERT
DELETE
Q71
Q71 What is the difference between a primary key and a foreign key?
A primary key can contain duplicates, while a foreign key cannot
A foreign key uniquely identifies records, while a primary key does not
A primary key uniquely identifies records in its own table, while a foreign key refers to the primary key in another table
There is no difference
Q72
Q72 Which SQL statement is used to insert a new record into a table?
INSERT INTO
ADD RECORD
INSERT NEW
ADD ROW
Q73
Q73 What will be the result of the following SQL query?
SELECT * FROM Customers WHERE Country = 'Germany';
It will delete records from the Customers table
It will update records in the Customers table
It will retrieve all records from the Customers table where the Country is 'Germany'
It will retrieve all records from the Customers table
Q74
Q74 Consider the SQL query: SELECT name, COUNT() FROM Employees GROUP BY name HAVING COUNT() > 1;
What does this query do?
It retrieves names of employees and the number of times each appears, filtering only those names that appear more than once
It deletes duplicate names from the Employees table
It updates the count of employee names in the Employees table
It retrieves all records from the Employees table
Q75
Q75 A user reports that they are unable to retrieve specific data from a database.
What could be the issue?
The SQL query might be incorrectly written
The database is full
The server is turned off
The application is outdated
Q76
Q76 A database query is taking too long to execute.
Which of the following could be a reason for this?
The database has too many indexes
The query is poorly optimized
The server has too much RAM
The network is too fast
Q77
Q77 A database admin notices frequent deadlocks occurring in a transaction-heavy database.
What could be the cause?
Improper indexing
Concurrent transactions trying to access the same resources
Too many indexes
Insufficient user permissions
Q78
Q78 What is the primary purpose of a firewall in a computer network?
To store data
To block unauthorized access
To increase processing speed
To display graphics
Q79
Q79 Which of the following is considered a strong password?
password123
JohnDoe
ABCDEF
5f^#2kG!vD
Q80
Q80 What is the purpose of encryption in computer security?
To delete files
To hide the user interface
To protect data by converting it into a code
To increase the size of files
Q81
Q81 What does the term "phishing" refer to in the context of cybersecurity?
A type of malware
A hacking technique involving fake websites or emails
A method of protecting data
A tool for software development
Q82
Q82 Which of the following is a characteristic of ransomware?
It protects your data
It encrypts your data and demands payment for decryption
It speeds up your computer
It is used to create backups
Q83
Q83 Which of the following commands can be used in Linux to change the permissions of a file?
chmod
ps
grep
ls
Q84
Q84 Which SQL command can be used to prevent SQL injection attacks?
SELECT *
INSERT INTO
DROP TABLE
Prepared Statements
Q85
Q85 A user reports that their antivirus software has detected a virus, but it cannot remove it.
What should they do next?
Ignore the warning
Turn off the antivirus
Update the antivirus software and run a full scan
Delete all files
Q86
Q86 An employee receives an email asking for their login credentials.
What should they do?
Reply with the information
Click the link provided
Forward the email to IT support
Delete the email immediately
Q87
Q87 A company's database has been encrypted by ransomware.
What is the best course of action?
Pay the ransom
Disconnect the infected systems from the network
Ignore the attack
Continue using the database
Q88
Q88 What does the acronym URL stand for?
Uniform Resource Locator
Universal Resource Locator
Uniform Routing Locator
Universal Routing Locator
Q89
Q89 Which of the following is a common use of HTML?
To create websites
To manage databases
To program operating systems
To design graphics
Q90
Q90 What is the primary purpose of CSS in web development?
To define the structure of a web page
To manage database connections
To style and layout web pages
To perform calculations