Solutions Version 2026/2027.
1: When a computer is powered on, the initial set of instructions is executed by a firmware program
stored on a non-volatile chip. This process identifies, tests, and initializes system devices such as the
CPU, RAM, and storage controllers before handing control to the operating system. What is the name
of this low-level software interface?
A) Kernel
B) BIOS/UEFI
C) CMOS
D) Bootloader
correct answer: B
2: Modern Central Processing Units (CPUs) utilize a high-speed volatile memory located directly on
the processor chip to reduce the average time to access data from the main memory. This memory is
divided into multiple levels (L1, L2, L3) based on proximity to the core and storage capacity. What is
this type of memory called?
A) Virtual Memory
B) Cache Memory
C) Dynamic RAM
D) Register File
correct answer: B
3: In the context of the OSI (Open Systems Interconnection) model, which layer is responsible for the
mechanical, electrical, and functional specifications of the physical link between communicating
devices, including the transmission of raw bitstreams over a physical medium?
A) Data Link Layer
B) Transport Layer
C) Physical Layer
D) Network Layer
correct answer: C
4: Solid State Drives (SSDs) have largely replaced traditional Hard Disk Drives (HDDs) in high-
performance computing because they lack moving parts. Instead, they use a specific type of non-
volatile electronic storage that can be electrically erased and reprogrammed. What is the name of
this storage technology?
A) Magnetic Platters
B) NAND Flash Memory
C) Static RAM
D) Optical Storage
correct answer: B
5: When a user enters a human-readable web address like "www.example.com" into a browser, the
system must translate this name into a numerical IP address that computers use to identify each
other. Which hierarchical and decentralized naming system handles this translation?
A) HTTP
B) TCP/IP
C) Domain Name System (DNS)
,D) File Transfer Protocol (FTP)
correct answer: C
6: In database management, a specific set of properties is required to ensure that database
transactions are processed reliably. These properties ensure that a transaction is treated as a single
unit, remains consistent, is isolated from others, and is permanently stored. What is the acronym for
these properties?
A) REST
B) CRUD
C) ACID
D) SOAP
correct answer: C
7: Cyber-attacks that attempt to make a machine or network resource unavailable to its intended
users by flooding the target with superfluous requests to overload the system are categorized as
what type of threat?
A) Phishing
B) Man-in-the-Middle (MitM)
C) Distributed Denial of Service (DDoS)
D) SQL Injection
correct answer: C
8: Virtualization technology allows a single physical server to run multiple independent operating
systems simultaneously. What is the name of the specialized software or hardware that creates and
manages these virtual machines by distributing physical resources like CPU and RAM?
A) Container
B) Hypervisor
C) Emulator
D) Virtual Switch
correct answer: B
9: The "Heart" of a Linux-based operating system is a program that manages the system's resources,
including the communication between hardware and software components. It stays in the memory
for the duration of the session. What is this component called?
A) Shell
B) GUI
C) Kernel
D) Compiler
correct answer: C
10: Which network protocol operates at the Transport Layer of the OSI model and provides a
connection-oriented, reliable, and error-checked delivery of a stream of octets between applications
running on hosts communicating via an IP network?
A) UDP
B) TCP
C) ICMP
D) ARP
correct answer: B
, 11: In the field of cybersecurity, a technique is used where a sender encrypts data with a recipient's
public key, and only the recipient can decrypt it using their private key. This ensures confidentiality
without the need to share a secret key beforehand. What is this called?
A) Symmetric Encryption
B) Asymmetric (Public Key) Encryption
C) Hashing
D) Salting
correct answer: B
12: A Graphics Processing Unit (GPU) is designed to handle specialized tasks that involve parallel
processing. Unlike a CPU, which has a few cores optimized for sequential tasking, a GPU has
thousands of smaller cores. What is the primary application for this architecture?
A) Text Editing
B) Matrix calculations and rendering graphics
C) Managing file directories
D) BIOS updates
correct answer: B
13: What is the name of the networking device that operates at Layer 3 (Network Layer) and is
responsible for forwarding data packets between different computer networks based on IP
addresses?
A) Switch
B) Hub
C) Router
D) Bridge
correct answer: C
14: In programming, a concept allows a class to inherit the properties and behaviors of another class,
promoting code reusability and a hierarchical relationship between objects. What is this fundamental
principle of Object-Oriented Programming (OOP)?
A) Encapsulation
B) Polymorphism
C) Inheritance
D) Abstraction
correct answer: C
15: Cloud computing offers a service model where users can rent virtualized hardware resources
such as servers, storage, and networking over the internet, allowing them to install their own
operating systems and applications. What is this model called?
A) Software as a Service (SaaS)
B) Platform as a Service (PaaS)
C) Infrastructure as a Service (IaaS)
D) Function as a Service (FaaS)
correct answer: C
16: When a computer runs out of physical RAM, the operating system uses a portion of the hard
drive or SSD to temporarily store data that is not currently being used by the CPU. This technique
allows the system to run more applications than the physical memory would normally allow. What is
this called?
A) Caching