Computer Science/IT – Sharpen Your Knowledge!
NEW

Computer Science/IT MCQs

Topic Notes: Computer Science/IT

MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.

Plato

  • Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
  • Important Ideas:
    • Theory of Forms
    • Philosopher-King
    • Ideal State
1291
An attacker rummages through a company's trash to find discarded documents with sensitive information. This technique is called:
Discuss in Board
1292
A user receives an email that looks like it's from a file-sharing service, with a link to a shared document. The link leads to a fake login page. This is an example of:
Discuss in Board
1293
The single most important practice for staying safe online is:
Discuss in Board
1294
You receive an email with a link to reset your password. The link text is "[https://your-email-provider.com/reset](https://www.google.com/search?q=https://your-email-provider.com/reset)", but when you hover over it, the actual URL is "[http://hacker-site.ru](https://www.google.com/search?q=http://hacker-site.ru)". This is a red flag for:
Discuss in Board
1295
A social engineering attack that happens slowly over a long period is known as:
Discuss in Board
1296
Before connecting to a public Wi-Fi network, you should:
Discuss in Board
1297
An email from an unknown sender contains a link with a shortened URL (e.g., bit.ly). What should you do?
Discuss in Board
1298
What is "formjacking"?
Discuss in Board
1299
Social engineering is best described as:
Discuss in Board
1300
You see a link in a social media post that has been shortened using a service like bit.ly. What is a good practice before clicking it?
Discuss in Board