Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2811
The primary difference between a virus and a worm is that a virus requires _____, while a worm does not.
Answer:
a host program to attach to
The key differentiator is that a virus is a parasitic piece of code that needs a host file to live in and spread. A worm is a self-contained program that can spread on its own across networks without needing a host.
2812
You receive an email that appears to be from your bank, but the sender's email address is misspelled and the grammar is poor. The best prevention technique is:
Answer:
Recognize these red flags, trust your instincts, and delete the email without interacting with it.
This is a clear phishing attempt. Being able to recognize the common signs of a scam—such as poor spelling, a sense of urgency, and suspicious sender details—is a fundamental skill for malware prevention. Never use contact information provided in a suspicious email to verify it.
2813
An infection method where malware is hidden within the advertisements on a legitimate website is known as:
Answer:
Malvertising
Malvertising, or malicious advertising, involves injecting malware into ad networks. These malicious ads can be displayed on high-traffic, reputable websites, and can infect users even if they do not click on the ad itself.
2814
What is the "Windows Defender"?
Answer:
A built-in anti-malware component of the Microsoft Windows operating system.
Microsoft Windows Defender is the free, built-in antivirus and anti-malware solution that comes with modern versions of Windows. It provides real-time protection and has improved significantly over the years.
2815
Cloud-based antivirus solutions offer an advantage over traditional ones because:
Answer:
They can offload the processing and virus definition storage to the cloud, reducing the impact on the user's computer.
Cloud-based AV can use vast, constantly updated threat intelligence from a global network. By performing analysis in the cloud, it can detect threats more quickly and use a smaller footprint on the local device.
2816
The "principle of least privilege" (PoLP) is a security practice where users are given:
Answer:
The minimum levels of access or permissions needed to perform their job functions.
Implementing the principle of least privilege means that if a user's account is compromised, the attacker's access to the system is limited. Using a standard user account for daily tasks instead of an administrator account is a key part of this practice.
2817
What is a good practice when creating a worksheet in Excel?
Answer:
Placing titles for columns in the first row
It's best to use the first row to title the columns for easy reference and understanding of the data.
2818
PowerPoint Interface & Views This category covers the user interface, different viewing modes, and general navigation within the PowerPoint application. Which panel tab is NOT present on the left when you first open a PowerPoint presentation?
Answer:
Notes
The default left panel shows Outline and Slides, but Notes is not among the standard tabs.
2819
Which program can be used for sending and receiving emails?
Answer:
Outlook Express
Outlook Express is an email client designed for composing, sending, receiving, and managing email messages.
2820
Which of the following is NOT a principle of data privacy?
Answer:
Data maximization
Data maximization is not a principle of data privacy. Principles like data minimization (collecting only necessary data), purpose limitation (using data only for specified reasons), and accountability (being responsible for data handling) are fundamental to privacy regulations.