1: In the context of a CPU, what is the specific role of the "Program Counter" (PC) register during the
fetch-decode-execute cycle?
A) It counts the total number of instructions executed since boot.
B) It holds the memory address of the next instruction to be fetched and executed.
C) It stores the result of the last arithmetic operation.
D) It manages the speed of the system clock.
correct answer: B
2: Which networking protocol is used specifically to resolve a known IP address into a physical MAC
address on a local area network?
A) DNS
B) DHCP
C) ARP
D) ICMP
correct answer: C
3: In a relational database, what is the primary purpose of a "Foreign Key"?
A) To uniquely identify a record within its own table.
B) To establish and enforce a link between data in two different tables.
C) To encrypt sensitive data fields.
D) To speed up the search process for text-based queries.
correct answer: B
4: What is the main difference between "Static RAM" (SRAM) and "Dynamic RAM" (DRAM)?
A) DRAM is faster than SRAM.
B) DRAM must be periodically refreshed to retain data, whereas SRAM does not as long as power is
supplied.
C) SRAM is much cheaper to produce in large capacities.
D) DRAM is used for CPU cache, while SRAM is used for main system memory.
correct answer: B
5: In the OSI model, which layer is responsible for end-to-end communication, flow control, and error
recovery?
A) Network Layer
B) Transport Layer
C) Session Layer
D) Data Link Layer
correct answer: B
6: What is a "Kernel Panic" in the context of operating systems like macOS or Linux?
A) A user interface error that can be ignored.
B) A safety measure taken by an OS kernel upon detecting a fatal internal error from which it cannot
safely recover.
C) A type of virus that steals passwords.
D) A notification that the hard drive is full.
correct answer: B
, 7: Which HTTP status code indicates that a server is temporarily unable to handle a request, usually
due to maintenance or overloading?
A) 403 Forbidden
B) 500 Internal Server Error
C) 503 Service Unavailable
D) 404 Not Found
correct answer: C
8: In Object-Oriented Programming, what is "Polymorphism"?
A) The ability of a single variable name to store multiple data types at once.
B) The ability of different classes to be treated as instances of the same class through inheritance,
specifically having different implementations of the same method.
C) The process of hiding internal data from outside access.
D) The act of destroying an object once it is no longer needed.
correct answer: B
9: What is the function of a "Default Gateway" in an IP configuration?
A) It acts as the local DNS server.
/B) It provides the path for traffic to leave the local network and reach other networks or the
internet.
C) It prevents unauthorized users from accessing the Wi-Fi.
D) It assigns IP addresses to devices.
correct answer: B
10: Which type of cloud service model provides a platform allowing customers to develop, run, and
manage applications without the complexity of building and maintaining the infrastructure?
A) IaaS
B) PaaS
C) SaaS
D) DaaS
correct answer: B
11: What is the "Von Neumann Bottleneck"?
A) A physical crack in a CPU chip.
B) The limited throughput between the CPU and memory compared to the speed of the CPU itself.
C) A software bug found in early Windows versions.
D) The slow speed of mechanical hard drives.
correct answer: B
12: In Linux, what does the command sudo stand for?
A) System User Direct Operation
B) Superuser Do
C) Secure User Data Output
D) Standard Unified Device Operator
correct answer: B
13: Which type of cybersecurity attack involves an attacker positioning themselves between two
parties to secretly intercept and possibly alter the communication?
A) Phishing
B) Man-in-the-Middle (MitM)