Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5351
Which device provides surge protection and battery backup during a power outage?
Answer:
UPS
An Uninterruptible Power Supply (UPS) provides emergency power and surge protection for connected equipment.
5352
Ideally, what should your ethical sense guide you to decide?
Answer:
What to do
Ethics provides a framework of moral principles that guide behavior and help determine the right course of action.
5353
Illegally copying software for commercial use is termed:
Answer:
Software Piracy
Software piracy violates copyright laws by distributing licensed software without permission. [cite: 235]
5354
Which of the following acronyms correctly defines 'ARP' in the context of networking protocols?
Answer:
Address Resolution Protocol
ARP stands for 'Address Resolution Protocol'. It is a crucial communication protocol operating at Layer 2 (Data Link Layer) of the OSI model. Its primary function is to map an Internet Protocol (IP) address (which operates at Layer 3) to a physical machine address, specifically a Media Access Control (MAC) address, within a local area network (LAN). When a device needs to send data to another device on the same network but only knows its IP address, it uses ARP to discover the corresponding MAC address. This MAC address is essential for framing data for transmission over the physical network medium.
5355
This power protection device includes a battery that provides a few minutes of power during an outage:
Answer:
UPS
A UPS provides short-term emergency power to a load when the input power source fails.
5356
Which of the following attributes is most universally associated with the general understanding of a 'hacker'?
Answer:
The act of obtaining unauthorized access to computer systems or data.
In common parlance, and often in cybersecurity contexts, the term 'hacker' most frequently refers to an individual who gains unauthorized access to computer systems, networks, or data. While hackers may possess exceptional technical skills (Option A) and their motivations can vary (Option B describes 'ethical hackers' or 'penetration testers' — a specific type of hacker), the defining characteristic that universally applies to the general concept of hacking is the illicit or unapproved entry. Option D describes a positive community involvement unrelated to the core act of hacking.
5357
Which of the following is the most ubiquitous and frequently employed method for authenticating users and controlling access to computer systems?
Answer:
Passwords
Passwords remain the most common and widely utilized tool for restricting access to computer systems. While other methods like biometrics, hardware tokens, and digital certificates offer enhanced security, passwords are the foundational and most frequently encountered authentication mechanism across a vast array of systems, from personal computers to online services. They require a user to provide a secret string of characters to verify their identity and gain authorized entry. Even multi-factor authentication often incorporates a password as one of its factors.
5358
The phrase that includes viruses, worms, Trojan horses, and attack scripts is what?
Answer:
Malware
Malware is a collective term for any malicious software designed to harm or exploit computer systems.
5359
To recover files from a backup, you must perform a \_\_.
Answer:
Restore
The process of retrieving data from a backup and returning it to its original or a new location is called a restore.
5360
What is cyberbullying?
Answer:
Digital harassment
Cyberbullying includes offensive or threatening behavior via texts, posts, or social platforms.