Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
181
What is the difference between local storage and session storage?
Answer:
Local storage is persistent, while session storage is cleared when you close your browser
This is the main difference between the two types of web storage.
182
What is a "certificate authority" (CA)?
Answer:
All of the above
CAs play a critical role in the security of the internet.
183
What are "rich snippets"?
Answer:
All of the above
Rich snippets can help to make your search results more informative and visually appealing.
184
The term for logging into an Internet account is:
Answer:
Log in
Logging in grants access to an account or service.
185
What is WPA2 or WPA3?
Answer:
A security protocol for wireless networks
Wi-Fi Protected Access 2 (WPA2) and its successor WPA3 are security protocols used to encrypt traffic on Wi-Fi networks.
186
Which of the following is a text-based web browser?
Answer:
All of the above
Text-based browsers are useful in command-line environments and for users with visual impairments.
187
A satellite internet connection generally has:
Answer:
High bandwidth and high latency
While satellite can provide decent bandwidth, it has very high latency due to the immense distance the signal must travel to the satellite and back.
188
By an extranet, we mean
Answer:
The intranets of two cooperating organizations interconnected via a secure leased line
An extranet is a controlled private network that links the intranets of two or more organizations, allowing secure communication and collaboration with trusted external partners like suppliers or customers.[simpplr+2](https://www.simpplr.com/glossary/extranet/)
189
To secure a wireless network, you should:
Answer:
All of the above.
These are all good practices for securing a wireless network.
190
A switch connects:
Answer:
Both b and c
A switch is used to connect devices, such as computers and printers, within the same network.