Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
6341
If you mark an email as "Not Junk," Outlook will:
Answer:
Move the message to your Inbox and try to learn from this action to improve future filtering
This action corrects the filter's mistake (a "false positive") and helps to train it so that emails from that sender or similar emails are less likely to be marked as junk in the future.
6342
A recipient of your encrypted email must have what to read it?
Answer:
Their own digital ID or a one-time passcode to prove their identity
To decrypt a message, the recipient needs the corresponding key. In an S/MIME system, this is their private key. In Microsoft 365 encryption, they may need to sign in or use a code to access the secure message portal.
6343
Which action helps to protect you from malware?
Answer:
Keeping your Outlook application and antivirus software up to date
Software updates often contain patches for newly discovered security vulnerabilities. Keeping your software current is one of the most important steps in staying protected.
6344
The red ribbon or certificate icon in the message list or message header indicates that the email is:
Answer:
Digitally signed
The ribbon/certificate icon is the symbol used to show that a message has a valid digital signature, verifying the sender's identity.
6345
The padlock icon in the message list or message header indicates that the email is:
Answer:
Encrypted
The padlock is the standard symbol used in Outlook to signify that the message content has been encrypted for confidentiality.
6346
"Spoofing" is the act of:
Answer:
Sending an email that forges the sender's address to make it look like it came from someone else
Spoofing is a common technique used in phishing and spam. Attackers may spoof the address of a trusted brand or a person within your own company to trick you.
6347
Outlook's feature to block external content (like images) in emails helps protect your privacy because:
Answer:
Loading images can signal to spammers that your email address is active and being read
Many spammers embed a tiny, invisible image (a "web beacon") in their emails. When your email client loads this image from their server, it confirms to them that you opened the message, making your address a more valuable target.
6348
If you receive an email with an attachment you were not expecting, what is the safest course of action?
Answer:
Do not open it, and verify with the sender through a separate, trusted channel (like a phone call) that they intended to send it
Unexpected attachments are a major security risk. A sender's email account could have been compromised and used to send malware. Replying to the email is unsafe, as you may be communicating with the attacker.
6349
To digitally sign an email, you must first have a:
Answer:
Digital ID, or certificate, installed on your computer
A digital ID is issued by a Certificate Authority (CA) and acts as your unique digital identity. It contains the public and private keys necessary to create digital signatures and encrypt messages.
6350
The "Junk Email Options" allow you to:
Answer:
Set the level of protection (e.g., Low, High, Safe Lists Only)
In these options, you can adjust how aggressively the filter works. "High" will catch more spam but may also misidentify more legitimate emails, while "Safe Lists Only" is the most restrictive, only allowing mail from people on your Safe Senders list.