Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
3551
Which file format typically utilizes 'lossy' data compression techniques to reduce its size, often by irreversibly discarding some information perceived as less critical?
Answer:
Digital video stream (.mp4)
Lossy compression is a data encoding method that achieves high compression ratios by intelligently discarding some information. This method is particularly effective for multimedia such as audio, images, and video, where small reductions in quality are often imperceptible to human senses, or the benefits of reduced file size/bandwidth outweigh a minor quality loss. MPEG-4 (.mp4) is a widely used digital multimedia container format that heavily relies on lossy compression for both its video (e.g., H.264/AVC, H.265/HEVC codecs) and audio (e.g., AAC codec) components. Executable files (.exe), plain text documents (.txt), and spreadsheet files (.xlsx) almost exclusively use lossless compression (if any) to ensure data integrity, as any discarded information would render the file unusable or incorrect.
3552
Granting 'write' permissions to all users for a critical system directory poses a significant security risk. Which of the following best explains why this is considered a security vulnerability?
Answer:
Unauthorized users could maliciously or accidentally alter or remove essential operating system files, potentially leading to system instability, data corruption, or a complete system failure.
Granting 'write' permissions to all users for a system folder is a major security risk because it allows anyone with access to the system to modify, delete, or create files within that directory. Many critical operating system files reside in such folders. If these files are compromised (e.g., deleted, corrupted, or replaced with malicious versions), the system could become unstable, crash, or even be taken over by an attacker. This directly impacts the integrity, availability, and confidentiality of the system. Options A, C, and D are generally not direct or primary security risks associated with overly permissive write access to system folders.
3553
Consider the filename 'My_Report_Final.docx'. Which term accurately describes the '.docx' component?
Answer:
The file extension
The '.docx' part of the filename 'My_Report_Final.docx' is known as the file extension. A file extension is a suffix, typically after a dot (.), at the end of a computer file name. It indicates the type or format of the file, allowing the operating system and applications to recognize how to open or handle the file. For example, '.docx' signifies a Microsoft Word document, '.pdf' indicates an Adobe Portable Document Format file, and '.jpg' denotes a JPEG image file. Options A, C, and D are not standard or accurate terminology for this component.
3554
In which operating system family are file access permissions typically structured around distinct categories such as 'owner,' 'group,' and 'others'?
Answer:
Unix-like operating systems (e.g., Linux, macOS)
The 'owner,' 'group,' and 'others' (often abbreviated as 'ugo') permission model is a foundational and distinguishing characteristic of Unix-like operating systems, which include Linux, macOS (based on Darwin, a Unix-like kernel), and various BSD flavors. This model defines three primary entities for which read, write, and execute permissions can be independently set for each file and directory. While modern operating systems like Windows also have robust permission systems (ACLS - Access Control Lists), their structure is more granular and is not based on the simple 'owner/group/others' trinity. Android, being based on the Linux kernel, inherently uses a similar permission model at its core, but app-level permissions often abstract this underlying structure. However, when referring to the *primary structuring concept* for file system permissions, Unix-like systems are the definitive answer.
3555
Which of the following actions is generally NOT considered a fundamental operation performed directly on an individual file?
Answer:
Initializing a storage device's file system structure.
File operations are actions performed directly on individual files. 'Renaming' (Option A) changes a file's name. 'Copying' (Option B) creates a duplicate of a specific file. 'Deleting' (Option D) removes a particular file. 'Formatting' (Option C), however, is an operation applied to an entire storage medium (like a hard drive, USB drive, or partition) to prepare it for use by establishing a new file system. It erases all data and sets up the directory structure, not an action on a single, existing file.
3556
When naming a file in the Microsoft Windows operating system, which of the following symbols is generally prohibited from being used?
Answer:
Question mark (?)
Microsoft Windows operating systems enforce specific rules for file and folder naming, prohibiting certain characters due to their special functions within the system. The question mark (?) is a wildcard character used in search queries and is therefore reserved and invalid for use in file names. Other prohibited characters include: less than (<), greater than (>), colon (:), double quote ("), forward slash (/), backslash (\), vertical bar (|), and asterisk (*). The hyphen (-), period (.), and underscore (_) are all perfectly valid characters for use in Windows file names, often used for separating words or indicating file extensions.
3557
In a typical file system, when a user is granted 'read-only' access to a specific file, what primary action are they permitted to perform?
Answer:
View the file's content without alteration.
The 'read' permission (often referred to as 'read-only' access) in file systems grants a user the ability to open and view the contents of a file. This permission explicitly prohibits any actions that would modify, delete, or rename the file. Its purpose is to allow consumption of information contained within the file while safeguarding its integrity from unauthorized changes.
3558
Which of the following is the main purpose of applying file compression techniques?
Answer:
To decrease the overall storage space a file occupies.
File compression is a process that encodes information using fewer bits than the original representation. Its primary and most direct benefit is to reduce the file size. This reduction is achieved by identifying and eliminating redundant data within the file, allowing it to take up less storage space on a disk and be transmitted more quickly across networks. Options A, C, and D describe entirely different functionalities that are not the core purpose of file compression.
3559
Which of the following statements accurately describes a significant drawback of utilizing lossy data compression techniques?
Answer:
The process of lossy compression inevitably results in an irreversible degradation of the file's original data quality.
Lossy compression works by permanently discarding some of the original data in a file that is deemed less important to human perception. While this leads to significantly smaller file sizes, the discarded information cannot be recovered, meaning the decompressed file will not be an exact replica of the original. This 'loss' of data translates directly into a permanent reduction in the quality of the file, which is its defining characteristic and primary disadvantage. Options A, B, and D are generally false. Lossy compression offers substantial file size reductions, is used on files of various sizes, and while compression can be computationally intensive, it doesn't always require a 'very powerful computer' for common lossy formats.
3560
What does CC stand for?
Answer:
Carbon Copy
In the context of email, CC stands for Carbon Copy. The term originates from the use of carbon paper to make copies of documents. Sending a 'CC' sends a copy of the email to recipients other than the primary one listed in the 'To' field, and all recipients can see who received the copy.