Module quiz: Introduction to computers and operating systems :Introduction to Computers and Operating Systems and Security (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
When interacting with hardware, the OS communicates instructions through a device ______.
✅ Driver
❌ Preferences
❌ Registry
Explanation:
Device drivers act as the translator between the OS and hardware.
2. Question 2
To prevent unwanted elements from entering your computer system, you should use:
❌ Anti-virus
✅ Firewall
❌ Denial of Service
Explanation:
A firewall blocks unauthorized network traffic.
3. Question 3
Malicious software hiding inside other software is called a:
❌ Ransomware
❌ Botnet
✅ Trojan
Explanation:
A Trojan disguises itself as legitimate software to trick users.
4. Question 4
Which approaches reduce password risk? (Select all that apply)
✅ Use a different password for each account.
❌ Use long sequences of numbers.
✅ Avoid using predictable patterns.
Explanation:
Unique and unpredictable passwords increase security; long numeric strings are weak.
5. Question 5
________ refers to applications like MS Word or Excel.
❌ Malware
✅ Application software
❌ System software
6. Question 6
Examples of non-volatile memory: (Select all that apply)
❌ RAM
✅ USB drives
✅ Hard disk drives (HDD)
Explanation:
Non-volatile memory retains data even when power is off.
7. Question 7
Which CPU part receives signals?
✅ Control unit
❌ Registers
❌ Arithmetic unit
Explanation:
The control unit directs operations and handles signals.
8. Question 8
Where do you type commands?
❌ GUI
❌ API
✅ CLI
Explanation:
A Command Line Interface allows typed commands.
9. Question 9
Which OS rotates among tasks, giving each a fair time slice?
❌ Batch OS
✅ Time-sharing OS
❌ Distributed OS
10. Question 10
Advantages of proprietary software: (Select all that apply)
✅ Extensive documentation
❌ Less expensive
✅ Quick bug fixes
🧾 Summary Table
| Q# | Correct Answer(s) | Key Concept |
|---|---|---|
| 1 | Driver | OS–hardware communication |
| 2 | Firewall | Network protection |
| 3 | Trojan | Hidden malware |
| 4 | Different passwords, Avoid patterns | Password security |
| 5 | Application software | Productivity tools |
| 6 | USB, HDD | Non-volatile memory |
| 7 | Control unit | CPU signal handling |
| 8 | CLI | Typed command interface |
| 9 | Time-sharing OS | Fair resource allocation |
| 10 | Documentation, Quick fixes | Proprietary software benefits |