Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
4551
What is the term for an unsolicited commercial email, often sent to a large list of recipients?
Answer:
Spam
Spam specifically refers to unsolicited commercial (or sometimes malicious) emails sent in bulk. Phishing aims to steal information, malware is malicious software, and spoofing involves faking identities.
4552
Which technique involves sending emails that appear to be from a legitimate source to trick recipients into giving up sensitive information?
Answer:
Phishing
Phishing specifically targets users through deceptive emails and websites, pretending to be a trustworthy entity to lure individuals into revealing personal information such as passwords and credit card details.
4553
What is 'email spoofing'?
Answer:
Sending an email with a forged sender address to deceive the recipient.
Email spoofing is the creation of email messages with a forged sender address, often done to trick recipients into believing the email originated from a legitimate source, commonly used in phishing and spam.
4554
Which statement correctly describes a major difference between IMAP and POP3?
Answer:
IMAP keeps emails on the server, while POP3 typically downloads them and removes from server.
The key distinction is how they handle emails on the server. IMAP synchronizes emails, keeping them on the server for access across multiple devices, while POP3 traditionally downloads emails to a single client and may delete them from the server.
4555
What is the potential security risk of opening an email attachment from an unknown sender?
Answer:
It might contain malware or a virus.
Attachments from unknown or suspicious senders often contain malicious software (malware, viruses) designed to infect your computer, steal data, or cause damage.
4556
What is the standard protocol for sending email from an email client to an email server?
Answer:
SMTP
SMTP (Simple Mail Transfer Protocol) is universally used for transmitting email messages between email servers and from an email client to a sending email server.
4557
What does 'CC' stand for in an email application?
Answer:
Carbon Copy
CC stands for Carbon Copy, meaning that the recipients in this field receive a copy of the email, and their addresses are visible to all other recipients.
4558
Which of the following is a potential risk associated with clicking on suspicious links in emails?
Answer:
Redirecting you to malicious websites that can install malware or steal credentials.
Suspicious links are often used in phishing or malware distribution campaigns. Clicking them can lead to websites designed to steal personal data, download malicious software, or exploit browser vulnerabilities.
4559
When composing an email, what is the primary function of utilizing the 'BCC' field for a recipient?
Answer:
To send a hidden copy of the email to a recipient, whose address remains undisclosed to others.
The 'BCC' field stands for 'Blind Carbon Copy.' Its primary function is to allow you to send a copy of an email to recipients without revealing their email addresses to other recipients in the 'To,' 'Cc,' or even other 'BCC' fields. This is particularly useful for maintaining privacy, sending mass emails without exposing everyone's contact information, or informing someone discreetly about a conversation without their direct involvement being known to others.
4560
Which of the following describes a 'phishing' attack?
Answer:
Sending fraudulent emails to trick recipients into revealing sensitive information.
Phishing involves deceptive emails or messages designed to trick individuals into disclosing personal information like passwords or credit card numbers, often by impersonating a trustworthy entity.