Which component of a computer temporarily stores data that the CPU is currently processing or using?
- Hard Drive
- Keyboard
- Monitor
- RAM
RAM (Random Access Memory) is a component of a computer that 'temporarily stores data' that the CPU is currently processing. It provides fast access to data and programs that are in use.
In most programming languages, which arithmetic operation is performed first if no parentheses are used?
- Addition
- Division
- Multiplication
- Subtraction
In the absence of parentheses, most programming languages follow the order of operations (PEMDAS/BODMAS). This means that 'multiplication' is performed before addition, subtraction, and division. It's important to understand these rules for correctly evaluating mathematical expressions in code.
Which protocol is designed for the management of multicast group memberships and operates at the Network layer?
- ARP (Address Resolution Protocol)
- IGMP (Internet Group Management Protocol)
- OSPF (Open Shortest Path First)
- SMTP (Simple Mail Transfer Protocol)
IGMP, or Internet Group Management Protocol, is specifically designed for the management of multicast group memberships. It operates at the Network layer of the OSI model and is used by routers to learn about active multicast groups on a network.
The process of repeatedly merging code from different team members into a shared mainline to prevent integration problems is known as _______.
- Code Deployment
- Continuous Integration
- Parallel Development
- Version Control
Continuous Integration (CI) is the practice of merging code frequently into a shared repository to ensure early detection of integration problems and maintain code quality throughout the development process.
In terms of information assurance, what practice ensures that only authorized modifications are made to an organization's assets?
- Change Management
- Data Encryption
- Firewall Configuration
- Intrusion Detection
Change Management is a crucial practice in information assurance that ensures that only authorized modifications are made to an organization's assets, including hardware, software, and data. It involves a structured process of requesting, reviewing, and approving changes to maintain system integrity and security.
What technique do threat actors use to exploit human psychology, rather than technical vulnerabilities, to gain unauthorized access or information?
- Encryption
- Firewall
- Intrusion Detection System (IDS)
- Phishing
'Phishing' is a technique where threat actors use social engineering to manipulate human psychology and trick individuals into revealing sensitive information or granting unauthorized access.
A research institute is working on a complex weather prediction model that requires the simultaneous processing of vast datasets. Which type of computing infrastructure would best suit their needs?
- Grid Computing
- High-Performance Computing (HPC)
- Mainframe Computing
- Quantum Computing
For the processing of vast datasets and complex simulations, 'High-Performance Computing (HPC)' is the ideal choice. It offers exceptional processing power and parallel computing capabilities, making it suitable for tasks like weather prediction models. Mainframes, grid computing, and quantum computing may not provide the necessary performance.
In IT governance, the framework that provides a reference model to organize IT processes and consider their governance is known as _______.
- Agile
- COBIT
- DevOps
- ITIL
COBIT (Control Objectives for Information and Related Technologies) is a widely used framework for IT governance. It provides a set of best practices and standards to organize and govern IT processes, ensuring they align with business goals.
An embedded system, like a microwave or a washing machine, needs an operating system. What type of OS would be most suitable for such systems?
- Linux
- Real-time Operating System (RTOS)
- Windows OS
- macOS
Embedded systems, like microwaves or washing machines, benefit from a 'Real-time Operating System (RTOS)' because it provides predictable and timely responses, essential for control and automation in such devices.
A structured approach to aligning IT with business objectives and ensuring its optimal performance is often referred to as IT _______.
- Alignment
- Collaboration
- Enhancement
- Optimization
IT Alignment is the practice of ensuring that an organization's information technology (IT) strategy and initiatives are closely aligned with its business objectives. This alignment is crucial for maximizing the value IT can provide to the business.