Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5341
What is the standard length, in bits, of a Media Access Control (MAC) address?
Answer:
48 bits
A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC) for communication within a network segment (like an Ethernet LAN). This address operates at the data link layer (Layer 2) of the OSI model. Standard MAC addresses are 48 bits long. They are typically represented as six groups of two hexadecimal digits, separated by hyphens, colons, or dots (e.g., 00:0A:95:9D:68:16). Each hexadecimal digit represents 4 bits, so 6 groups of 2 hex digits means 12 hex digits in total, and 12 * 4 bits/hex digit = 48 bits.
5342
Inability to download due to website overload is called:
Answer:
Denial of Service Attack
A DoS attack floods the server with requests, making it inaccessible to users. [cite: 271]
5343
The Data Protection Act is granted by which country?
Answer:
UK
The Data Protection Act is a key piece of legislation in the United Kingdom (UK). The original act was passed in 1984 and has been updated several times, most recently in 2018 to incorporate the EU's GDPR, to govern the protection of personal data.
5344
Which term refers to confidential character strings utilized to verify a user's identity and grant them entry into a digital system or protected data?
Answer:
Password
A password (Option A) is a secret word, phrase, or string of characters used for authentication to prove identity and authorize access to a computer system, application, or data. It is the most common and fundamental security mechanism for controlling access. A username (Option B) identifies the user but doesn't grant access on its own. A PIN (Option C) is similar to a password but is typically a shorter, numeric code used for specific purposes like ATM transactions or mobile device unlocking. A digital signature (Option D) is a cryptographic technique used to validate the authenticity and integrity of a digital message or document, not primarily for system access.
5345
In ethics, the degree to which you relate to those affected by your actions is called what?
Answer:
Relatedness
Relatedness in ethics refers to the perceived proximity and connection to individuals who will be impacted by a decision.
5346
Which technology scrambles file contents before sending them over the internet?
Answer:
Encryption
Encryption converts readable data into an unreadable format to protect it from unauthorized access during transmission.
5347
To ensure files are preserved in case of system failure, you should create a \_\_.
Answer:
Backup
A backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
5348
Which tracking software records every keystroke made on a computer?
Answer:
Key logger
A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
5349
Which of the following is a data security threat?
Answer:
Fraudulent data manipulation
Intentionally altering data to misrepresent information is a significant threat to data integrity and security.
5350
Which law allows teachers to use copyrighted materials in class?
Answer:
Fair Use Doctrine
The Fair Use Doctrine permits the limited use of copyrighted material without acquiring permission from the rights holders, especially for educational purposes.