Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
101
Which tracking software records every keystroke made on a computer?
Answer:
Key logger
A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
102
Which of the following is a data security threat?
Answer:
Fraudulent data manipulation
Intentionally altering data to misrepresent information is a significant threat to data integrity and security.
103
Which law allows teachers to use copyrighted materials in class?
Answer:
Fair Use Doctrine
The Fair Use Doctrine permits the limited use of copyrighted material without acquiring permission from the rights holders, especially for educational purposes.
104
Which device provides surge protection and battery backup during a power outage?
Answer:
UPS
An Uninterruptible Power Supply (UPS) provides emergency power and surge protection for connected equipment.
105
Ideally, what should your ethical sense guide you to decide?
Answer:
What to do
Ethics provides a framework of moral principles that guide behavior and help determine the right course of action.
106
Illegally copying software for commercial use is termed:
Answer:
Software Piracy
Software piracy violates copyright laws by distributing licensed software without permission. [cite: 235]
107
Which of the following acronyms correctly defines 'ARP' in the context of networking protocols?
Answer:
Address Resolution Protocol
ARP stands for 'Address Resolution Protocol'. It is a crucial communication protocol operating at Layer 2 (Data Link Layer) of the OSI model. Its primary function is to map an Internet Protocol (IP) address (which operates at Layer 3) to a physical machine address, specifically a Media Access Control (MAC) address, within a local area network (LAN). When a device needs to send data to another device on the same network but only knows its IP address, it uses ARP to discover the corresponding MAC address. This MAC address is essential for framing data for transmission over the physical network medium.
108
This power protection device includes a battery that provides a few minutes of power during an outage:
Answer:
UPS
A UPS provides short-term emergency power to a load when the input power source fails.
109
Which of the following attributes is most universally associated with the general understanding of a 'hacker'?
Answer:
The act of obtaining unauthorized access to computer systems or data.
In common parlance, and often in cybersecurity contexts, the term 'hacker' most frequently refers to an individual who gains unauthorized access to computer systems, networks, or data. While hackers may possess exceptional technical skills (Option A) and their motivations can vary (Option B describes 'ethical hackers' or 'penetration testers' — a specific type of hacker), the defining characteristic that universally applies to the general concept of hacking is the illicit or unapproved entry. Option D describes a positive community involvement unrelated to the core act of hacking.
110
Which of the following is the most ubiquitous and frequently employed method for authenticating users and controlling access to computer systems?
Answer:
Passwords
Passwords remain the most common and widely utilized tool for restricting access to computer systems. While other methods like biometrics, hardware tokens, and digital certificates offer enhanced security, passwords are the foundational and most frequently encountered authentication mechanism across a vast array of systems, from personal computers to online services. They require a user to provide a secret string of characters to verify their identity and gain authorized entry. Even multi-factor authentication often incorporates a password as one of its factors.