Skip to content

Module quiz: Introduction to computers and operating systems :Introduction to Computers and Operating Systems and Security (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1

When interacting with hardware, the OS communicates instructions through a device ______.

Driver
❌ Preferences
❌ Registry

Explanation:
Device drivers act as the translator between the OS and hardware.


2. Question 2

To prevent unwanted elements from entering your computer system, you should use:

❌ Anti-virus
Firewall
❌ Denial of Service

Explanation:
A firewall blocks unauthorized network traffic.


3. Question 3

Malicious software hiding inside other software is called a:

❌ Ransomware
❌ Botnet
Trojan

Explanation:
A Trojan disguises itself as legitimate software to trick users.


4. Question 4

Which approaches reduce password risk? (Select all that apply)

Use a different password for each account.
❌ Use long sequences of numbers.
Avoid using predictable patterns.

Explanation:
Unique and unpredictable passwords increase security; long numeric strings are weak.


5. Question 5

________ refers to applications like MS Word or Excel.

❌ Malware
Application software
❌ System software


6. Question 6

Examples of non-volatile memory: (Select all that apply)

❌ RAM
USB drives
Hard disk drives (HDD)

Explanation:
Non-volatile memory retains data even when power is off.


7. Question 7

Which CPU part receives signals?

Control unit
❌ Registers
❌ Arithmetic unit

Explanation:
The control unit directs operations and handles signals.


8. Question 8

Where do you type commands?

❌ GUI
❌ API
CLI

Explanation:
A Command Line Interface allows typed commands.


9. Question 9

Which OS rotates among tasks, giving each a fair time slice?

❌ Batch OS
Time-sharing OS
❌ Distributed OS


10. Question 10

Advantages of proprietary software: (Select all that apply)

Extensive documentation
❌ Less expensive
Quick bug fixes


🧾 Summary Table

Q# Correct Answer(s) Key Concept
1 Driver OS–hardware communication
2 Firewall Network protection
3 Trojan Hidden malware
4 Different passwords, Avoid patterns Password security
5 Application software Productivity tools
6 USB, HDD Non-volatile memory
7 Control unit CPU signal handling
8 CLI Typed command interface
9 Time-sharing OS Fair resource allocation
10 Documentation, Quick fixes Proprietary software benefits