Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5321
The Children's Online Privacy Protection Act (COPPA) is a US law that applies to:
Answer:
is a US law that applies to:
COPPA places specific requirements on operators of websites or online services directed to children under 13, and on operators of other websites or services that have actual knowledge that they are collecting personal information online from a child under 13.
5322
The legal concept that holds that an organization can be held responsible for the actions of its employees is known as:
Answer:
Vicarious liability
Vicarious liability is a legal doctrine where one party is held responsible for the actions of a third party. In a business context, this means a company can be held liable for a data breach caused by the negligence or malicious action of one of its employees.
5323
The process of limiting a user’s access to application data based on privileges is:
Answer:
Access Control
Access control is a security technique that regulates who or what can view or use resources in a computing environment.
5324
A hacker who contacts you by phone or email to steal your password is engaging in:
Answer:
Phishing
Phishing is a social engineering attack where a hacker attempts to acquire sensitive information by masquerading as a trustworthy entity.
5325
Protecting data from destruction, disclosure, or modification is called what?
Answer:
Information security
Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information.
5326
In the right setting, an attacker may steal your information simply by watching what you type.
Answer:
Shoulder surfing
Shoulder surfing is the direct observation of a user's screen or keyboard to steal sensitive information.
5327
The ability to restrict or stop the collection, use, and sale of personal data is known as \_\_.
Answer:
Privacy
Privacy is the right of an individual to have control over their personal information and to be free from unauthorized surveillance.
5328
Data security threats include:
Answer:
All of the above
Data security threats encompass a wide range of risks, including unauthorized access, data alteration, and system failures.
5329
Which software is specifically designed to find and remove computer viruses?
Answer:
Antivirus
Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses.
5330
A thief who watches what you type in order to steal your information is called:
Answer:
A. Snagging
Shoulder surfing is the direct observation technique of looking over someone's shoulder to get information like passwords or PINs.