Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
6331
If you want to ask a question of your database to retrieve specific data, which object would you use?
Answer:
Query
A query is essentially a stored question. It allows you to pull information from one or more tables based on a set of criteria you define, letting you filter, sort, and calculate data.
6332
Which Access object is designed to provide a user-friendly interface for entering, viewing, and editing data one record at a time?
Answer:
Form
Forms are used to create an easy-to-use screen for interacting with the data in your tables. They can be customized with buttons, text boxes, and other controls to simplify data entry.
6333
In Microsoft Access, what is the primary object used for storing data?
Answer:
Table
Tables are the fundamental building blocks of a database. They store all the data in a structured format of rows (records) and columns (fields).
6334
What is Microsoft Access primarily designed for?
Answer:
Designing and Managing Databases
Microsoft Access is a database management system (DBMS) specifically designed for creating, managing, and analyzing databases. It allows users to create tables to store data, queries to find and retrieve data, forms for data entry, and reports to present data. ### Access Interface & Database Objects (Tables, Queries, Forms, Reports)
6335
Which Microsoft Office application is used to create and manage databases?
Answer:
MS Access
Microsoft Access is a database management system (DBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. It is a part of the Microsoft Office suite, used for creating and managing databases.
6336
The "Do Not Track" option for read receipts is designed to:
Answer:
Prevent Outlook from ever sending a read receipt, regardless of what the sender requests
This is a privacy setting. It allows you to choose to never send read receipts, or to be prompted each time one is requested, giving you control over when you notify a sender that you've viewed their message.
6337
If you are unsure about an email's legitimacy, what should you do?
Answer:
Delete it and do not click any links or open any attachments
The "when in doubt, throw it out" rule is the safest approach. Interacting with a potentially malicious email in any way, including replying, can be risky.
6338
The "Phishing" protection level in the Junk Email Options specifically targets:
Answer:
Messages with links that are known to be malicious or fraudulent
This part of the filter is designed to identify and disable links in emails that point to known phishing websites, adding another layer of protection against fraud.
6339
A strong password for your email account should ideally include:
Answer:
A mix of uppercase letters, lowercase letters, numbers, and symbols
Password complexity makes it much harder for attackers to guess your password or crack it using automated tools.
6340
Why is it generally unsafe to enable macros in an attachment from an unknown source?
Answer:
Macros can contain malicious code that can infect your computer with a virus or ransomware
Macros are powerful scripts that can automate tasks, but this power can be abused by attackers. Malicious macros are a very common way to deliver malware via email attachments like Word or Excel files.