Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2631
Which type of computer is more susceptible to noise and interference?
Answer:
Analog computer
** Since analog computers represent data as continuous physical quantities, any small disturbance or noise in the system can affect the accuracy of the representation and the final result. Digital signals, being discrete, are more robust against noise.
2632
What is the purpose of "signing" a database with a digital certificate?
Answer:
To prove to users that the database is from a trustworthy source and has not been tampered with
When a user opens a digitally signed database, they can choose to trust all publications from that publisher. This allows the active content to run without showing the security warning each time.
2633
Is antivirus software for mobile phones (e.g., Android, iOS) necessary?
Answer:
Yes, mobile devices can be infected with malware, and security apps can help protect against threats like malicious apps and phishing.
While mobile operating systems have strong built-in security, they are not immune to malware. Malicious apps can be downloaded from unofficial app stores or even sneak into official ones. Security software can add an important layer of protection.
2634
If you see your mouse moving on the screen and programs opening on their own, you may be a victim of a:
Answer:
Remote Access Trojan (RAT).
Seeing your cursor move on its own is a very strong indication that someone is remotely controlling your computer. This level of control is a key feature of a Remote Access Trojan (RAT).
2635
What type of malware is disguised in email attachments or free software downloads?
Answer:
Trojan Horse
Trojan horses appear harmless but contain malicious code that activates upon execution.
2636
The WannaCry worm's spread was enabled by a Windows vulnerability known as "EternalBlue," which was allegedly developed by what organization?
Answer:
The U.S. National Security Agency (NSA)
The EternalBlue exploit, which targets a vulnerability in Microsoft's SMB protocol, was widely reported to have been developed by the NSA and was later leaked by the "Shadow Brokers" hacker group. It was then repurposed by other criminals to create WannaCry.
2637
What computer virus gained notoriety for its extensive global reach?
Answer:
I Love You
The 'I Love You' worm, also known as LoveLetter, spread rapidly in May 2000. It propagated through email with the subject line "ILOVEYOU" and an attachment. It caused widespread damage estimated in the billions of dollars and is considered one of the most virulent computer viruses ever.
2638
Viruses that activate at a specific time or date are called:
Answer:
Time bombs
Time bombs are malicious programs set to activate on a particular date or after a certain event has occurred.
2639
A program that appears to be a legitimate application, such as a game or utility, but contains malicious functions is known as a:
Answer:
Trojan Horse
A Trojan Horse, or Trojan, is a type of malware that misleads users of its true intent. It is disguised as or embedded within legitimate software, and when executed, it can perform malicious actions like creating a backdoor for remote access.
2640
The MyDoom worm (2004) is famous for what reason?
Answer:
It is considered the fastest-spreading email worm in history.
?