Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2891
What is the full form of DHCP in computer networking?
Answer:
Dynamic Host Configuration Protocol
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers for a given network.
2892
What is a person known as who uses their expertise to gain unauthorized access to others' computers for malicious purposes?
Answer:
{'id': 4, 'text': 'Hacker'}
A hacker is an individual who uses their extensive knowledge of computers and networks to gain unauthorized access to systems. While the term can sometimes be used for ethical security experts, it commonly refers to those with malicious intent (also known as black-hat hackers or crackers).
2893
What is the bit length of a standard Media Access Control (MAC) address?
Answer:
48 bits
A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. Standard MAC addresses are 48 bits long and are typically written as six groups of two hexadecimal digits.
2894
What unit is used to measure the speed of an internet connection?
Answer:
Mbps
The speed of an internet connection, which refers to its data transfer rate or bandwidth, is typically measured in Mbps (megabits per second). GHz measures processor speed, dpi measures printer resolution, and ppm measures printer speed.
2895
Good passwords contain on ________?
Answer:
Alphanumeric
A strong password typically combines multiple character types to make it harder to guess or crack. This includes a mix of uppercase and lowercase alphabets, numbers, and symbols. "Alphanumeric" refers to the combination of alphabets and numbers, which is a key component of a strong password.
2896
What is a characteristic common to hackers?
Answer:
They access others' computers without permission
The defining characteristic of a hacker (in the common, negative sense) is the act of gaining unauthorized access to computer systems or networks. Their motivations can vary widely, from financial gain to political activism or simple curiosity, but the unauthorized access is the common element.
2897
What is the most common tool used to restrict access to a computer system?
Answer:
Passwords
Passwords are the most widely used authentication method for controlling access to computer systems. A user must provide the correct password associated with their user account to prove their identity and be granted access.
2898
What does MAC stand for in computer networking?
Answer:
Media Access Control
MAC stands for Media Access Control. A MAC address is a unique hardware identifier assigned to every network interface card (NIC). It is used for communication between devices on the same local network at the Data Link Layer.
2899
ARP stands for ________?
Answer:
Address resolution protocol
ARP stands for Address Resolution Protocol. It is a communication protocol used for discovering the link-layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
2900
What protocol is used for automatic TCP/IP configuration assignment?
Answer:
DHCP
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used on IP networks. A DHCP server automatically assigns an IP address and other network configuration parameters to each device on a network, so they can communicate with other IP networks.