Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
101
What is a "credit freeze"?
Answer:
A tool that restricts access to your credit report, making it harder for identity thieves to open new accounts in your name.
A credit freeze is a powerful tool to prevent identity theft. When your credit is frozen, lenders cannot access your credit report, which means they are unlikely to approve any new applications for credit in your name.
102
What is the primary goal of a phishing attack?
Answer:
To steal personal information, such as login credentials and credit card numbers
Phishing attacks are designed to trick individuals into divulging sensitive personal and financial information by masquerading as a trustworthy entity in an electronic communication.
103
A website that does not have a privacy policy should be considered:
Answer:
Suspicious, as legitimate sites are usually transparent about how they handle your data.
A privacy policy is a legal document that explains how an organization handles customer data. The absence of a privacy policy is a red flag and suggests the site may not be trustworthy.
104
Which of these is a potential sign of a spear phishing attempt?
Answer:
All of the above.
Spear phishing emails are often highly convincing because they are personalized. An unusual request from a known person, specific details about you, and a sense of urgency are all indicators of a potential spear phishing attack.
105
If you receive a friend request on social media from someone you don't know, what is the safest course of action?
Answer:
Ignore or delete the request.
Accepting friend requests from strangers can expose your personal information to scammers and social engineers who may be using fake profiles to gather data on potential targets.
106
What is "doxing"?
Answer:
The act of researching and broadcasting private or identifiable information about an individual or organization.
Doxing is a form of online harassment where an individual's personal information (like their real name, address, or phone number) is shared publicly without their consent, often with malicious intent.
107
If a website has a valid HTTPS certificate and a padlock icon, does that mean it's safe to use?
Answer:
Not necessarily. It only means the connection is encrypted. The site itself could still be malicious.
It has become easy and cheap for anyone, including scammers, to obtain an HTTPS certificate. While HTTPS is important for security, it is no longer a reliable indicator of a website's trustworthiness.
108
What is a "digital footprint"?
Answer:
The trail of data you leave behind when you are active online.
Your digital footprint includes everything from your social media posts and browsing history to online shopping data. It is important to be mindful of your digital footprint, as this data can be collected and used by various parties.
109
What is the main difference between social engineering and traditional hacking?
Answer:
Social engineering targets people, while hacking targets technology.
The core difference is the target of the attack. Hacking focuses on exploiting vulnerabilities in software and hardware, while social engineering focuses on exploiting vulnerabilities in human psychology.
110
What are "cookies" in the context of web browsing?
Answer:
Small files that websites store on your computer to remember information about you.
Cookies are used by websites for many purposes, such as keeping you logged in, remembering your site preferences, and tracking your browsing activity for advertising purposes.