Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5361
Which law prevents unauthorized access to voice communications by wire?
Answer:
Electronic Communications Privacy Act
The ECPA of 1986 protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored.
5362
Which network protocol streamlines the process of automatically assigning IP addresses and other crucial network configuration parameters to devices within a TCP/IP network?
Answer:
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) is specifically designed to automate the assignment of IP addresses, subnet masks, default gateways, DNS server addresses, and other network configuration settings to devices on an IP network. This automation significantly simplifies network administration by eliminating the need for manual configuration of each device.
Let's consider why the other options are incorrect:
* **FTP (File Transfer Protocol)** is used for transferring files between a client and a server on a computer network.
* **HTTP (Hypertext Transfer Protocol)** is the foundation of data communication for the World Wide Web, used for retrieving resources like web pages.
* **SMTP (Simple Mail Transfer Protocol)** is used for sending and receiving email messages over a network.
5363
In the context of computer networking, what does the acronym MAC represent, and what is its primary function?
Answer:
Media Access Control; it provides a unique hardware address for network interfaces and facilitates communication within a local network segment at the Data Link Layer.
MAC stands for Media Access Control. A MAC address is a unique identifier (a hardware address) assigned to network interface cards (NICs). Its primary function is to enable communication between devices on the same local network segment (LAN) by uniquely identifying each device at the Data Link Layer (Layer 2) of the OSI model. This allows data frames to be delivered to the correct recipient within that local network.
5364
Which technology uses fingerprints, eye scans, or voice recognition to protect information?
Answer:
Biometrics
Biometrics are body measurements and calculations related to human characteristics used for authentication.
5365
What is the process of converting plain text into unreadable code called?
Answer:
Encryption
Encryption is the process of converting information or data into a code, especially to prevent unauthorized access.
5366
Which web technology ensures a private, secure connection between two computers?
Answer:
Secure socket layers
SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client.
5367
Which process verifies a user’s identity before granting system access?
Answer:
Authentication
Authentication is the process of verifying the identity of a user or process, often through passwords, biometrics, or security tokens.
5368
A hacker contacting you by phone or email to get your password is called:
Answer:
Phishing
Phishing uses deceptive emails and websites to trick individuals into revealing personal information.
5369
What is a firewall?
Answer:
Security barrier
Firewalls regulate incoming and outgoing network traffic based on security rules.
5370
Which power protection device has a battery to provide short-term backup during outages?
Answer:
UPS
An Uninterruptible Power Supply (UPS) offers brief backup power from a battery during a power outage.