Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5371
Which of the following characteristics is most crucial for creating a strong and secure password that is resistant to common hacking attempts?
Answer:
A combination of uppercase and lowercase letters, numbers, and symbols.
A strong password is fundamentally built upon unpredictability and complexity. Option A, 'A combination of uppercase and lowercase letters, numbers, and symbols,' directly addresses this by maximizing the character set available, making brute-force attacks and dictionary attacks significantly more difficult. Each additional character type exponentially increases the number of possible password combinations. Option B, while desirable for user experience, often conflicts with security requirements; easy-to-remember passwords are frequently easy-to-guess. Options C and D are explicitly discouraged by security best practices. Dictionary words (Option C) are vulnerable to dictionary attacks, and personal information (Option D) can often be gleaned through social engineering or public records, making them highly susceptible to compromise.
5372
If configured correctly, the \_\_ will prevent interaction with your computer after a specified time period.
Answer:
Screen saver
A screen saver, especially one that is password-protected, can lock the computer after a period of inactivity to prevent unauthorized access.
5373
The primary purpose of a \_\_ is to prevent unauthorized access to a computer via the Internet.
Answer:
Firewall
A firewall acts as a barrier, monitoring and controlling incoming and outgoing network traffic to prevent unauthorized access to a private network.
5374
A \_\_ is anything that can cause harm.
Answer:
Threat
A threat is any potential circumstance or event with the potential to adversely impact an asset through unauthorized access, destruction, or modification.
5375
Which technology company originally developed Java, a programming language renowned for its cross-platform compatibility, often summarized by the phrase 'write once, run anywhere'?
Answer:
Sun Microsystems
Java was developed by a team led by James Gosling at Sun Microsystems in the early 1990s. The core principle behind Java's design was platform independence, encapsulated by the 'write once, run anywhere' (WORA) motto. This means that Java code, once compiled into bytecode, can execute on any device or operating system that has a Java Virtual Machine (JVM) installed, without needing recompilation. While Sun Microsystems was later acquired by Oracle Corporation in 2010, the initial development and launch of Java were under Sun's purview. Options A, B, and D were significant technology companies at the time but were not responsible for the creation of Java.
5376
Which advanced technological capability was the primary focus of development for fifth-generation computers?
Answer:
Artificial Intelligence and human-like reasoning
Fifth-generation computers, a concept that emerged in the 1980s, were primarily focused on developing Artificial Intelligence (AI) and technologies that would allow computers to exhibit human-like reasoning, understand natural language, learn from experience, and make decisions. This initiative aimed to move beyond traditional computing architectures to incorporate knowledge-based systems and parallel processing. Options B, C, and D represent technologies associated with much earlier generations of computers: vacuum tubes with the first generation, mechanical/electro-mechanical systems with generation zero/early first, and transistors/integrated circuits with the second to fourth generations, respectively.
5377
What was the main advantage of second-generation computers over their first-generation counterparts?
Answer:
They used less energy, were smaller, and more reliable.
The use of transistors in second-generation computers made them significantly smaller, faster, and more reliable. They also consumed less power and generated less heat compared to the vacuum tube-based first-generation machines.
5378
Which historical figure is credited with inventing the 'Stepped Reckoner,' an innovative mechanical calculator from the late 17th century capable of performing all four fundamental arithmetic operations?
Answer:
Gottfried Wilhelm Leibniz
Gottfried Wilhelm Leibniz (1646-1716), a German polymath, is renowned for inventing the 'Stepped Reckoner.' He completed prototypes of this mechanical calculator in 1672 and 1694. Unlike earlier machines like Pascal's calculator, which primarily handled addition and subtraction, Leibniz's device was groundbreaking because it could also perform multiplication and division efficiently, along with addition and subtraction. Its key innovation was the 'stepped drum' or 'Leibniz wheel,' a fluted drum mechanism that allowed for variable input and facilitated these more complex operations through a series of repeated additions. This invention marked a significant advancement in the history of computing machinery.
5379
The development of which component ushered in the fourth generation of computers and the age of personal computing?
Answer:
The Microprocessor
The fourth generation (1971-present) began with the invention of the microprocessor, which placed the entire central processing unit (CPU) onto a single chip. This innovation made it possible to build small, powerful computers that could fit on a desktop.
5380
Prior to the widespread adoption of magnetic disk storage, which method was predominantly used for non-volatile computer data storage?
Answer:
Punched Cards and Paper Tape
Before magnetic disks became common, 'Punched Cards and Paper Tape' were the primary forms of secondary (non-volatile) storage for computers. These methods involved representing data as patterns of holes punched into cards or long strips of paper. While slow, bulky, and prone to errors, they were essential for storing programs and data long-term, feeding instructions into early computers, and retrieving results. Solid State Drives and Optical Discs are much more recent inventions. ROM cartridges, while non-volatile, served specific purposes like game distribution rather than general-purpose secondary data storage for early mainframe or personal computers.