Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
121
A hacker contacting you by phone or email to get your password is called:
Answer:
Phishing
Phishing uses deceptive emails and websites to trick individuals into revealing personal information.
122
What is a firewall?
Answer:
Security barrier
Firewalls regulate incoming and outgoing network traffic based on security rules.
123
Which power protection device has a battery to provide short-term backup during outages?
Answer:
UPS
An Uninterruptible Power Supply (UPS) offers brief backup power from a battery during a power outage.
124
Which of the following characteristics is most crucial for creating a strong and secure password that is resistant to common hacking attempts?
Answer:
A combination of uppercase and lowercase letters, numbers, and symbols.
A strong password is fundamentally built upon unpredictability and complexity. Option A, 'A combination of uppercase and lowercase letters, numbers, and symbols,' directly addresses this by maximizing the character set available, making brute-force attacks and dictionary attacks significantly more difficult. Each additional character type exponentially increases the number of possible password combinations. Option B, while desirable for user experience, often conflicts with security requirements; easy-to-remember passwords are frequently easy-to-guess. Options C and D are explicitly discouraged by security best practices. Dictionary words (Option C) are vulnerable to dictionary attacks, and personal information (Option D) can often be gleaned through social engineering or public records, making them highly susceptible to compromise.
125
If configured correctly, the \_\_ will prevent interaction with your computer after a specified time period.
Answer:
Screen saver
A screen saver, especially one that is password-protected, can lock the computer after a period of inactivity to prevent unauthorized access.
126
The primary purpose of a \_\_ is to prevent unauthorized access to a computer via the Internet.
Answer:
Firewall
A firewall acts as a barrier, monitoring and controlling incoming and outgoing network traffic to prevent unauthorized access to a private network.
127
A \_\_ is anything that can cause harm.
Answer:
Threat
A threat is any potential circumstance or event with the potential to adversely impact an asset through unauthorized access, destruction, or modification.