Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
11
The padlock icon in the message list or message header indicates that the email is:
Answer:
Encrypted
The padlock is the standard symbol used in Outlook to signify that the message content has been encrypted for confidentiality.
12
"Spoofing" is the act of:
Answer:
Sending an email that forges the sender's address to make it look like it came from someone else
Spoofing is a common technique used in phishing and spam. Attackers may spoof the address of a trusted brand or a person within your own company to trick you.
13
Outlook's feature to block external content (like images) in emails helps protect your privacy because:
Answer:
Loading images can signal to spammers that your email address is active and being read
Many spammers embed a tiny, invisible image (a "web beacon") in their emails. When your email client loads this image from their server, it confirms to them that you opened the message, making your address a more valuable target.
14
If you receive an email with an attachment you were not expecting, what is the safest course of action?
Answer:
Do not open it, and verify with the sender through a separate, trusted channel (like a phone call) that they intended to send it
Unexpected attachments are a major security risk. A sender's email account could have been compromised and used to send malware. Replying to the email is unsafe, as you may be communicating with the attacker.
15
To digitally sign an email, you must first have a:
Answer:
Digital ID, or certificate, installed on your computer
A digital ID is issued by a Certificate Authority (CA) and acts as your unique digital identity. It contains the public and private keys necessary to create digital signatures and encrypt messages.
16
The "Junk Email Options" allow you to:
Answer:
Set the level of protection (e.g., Low, High, Safe Lists Only)
In these options, you can adjust how aggressively the filter works. "High" will catch more spam but may also misidentify more legitimate emails, while "Safe Lists Only" is the most restrictive, only allowing mail from people on your Safe Senders list.
17
Why should you be cautious about emails that create a sense of urgency, such as "Your account will be closed in 24 hours"?
Answer:
Because this is a common tactic used in phishing emails to make you act quickly without thinking
Creating panic or urgency is a social engineering technique designed to bypass your rational judgment. Legitimate companies rarely use such high-pressure tactics for routine account notices.
18
What is a "delivery receipt"?
Answer:
A confirmation from the recipient's mail server that the email has been successfully delivered to their mailbox
A delivery receipt confirms the message reached the mailbox. A read receipt confirms the recipient opened it. Delivery confirmation happens first and is more reliable.
19
Two-Factor Authentication (2FA) for your email account adds a layer of security by:
Answer:
Requiring something you know (your password) and something you have (like a code from your phone)
2FA provides a major security boost. Even if a thief steals your password, they cannot access your account without also having physical access to your phone or other second factor.
20
Outlook may display a warning banner at the top of an email that says, "This sender failed our fraud detection checks." This indicates:
Answer:
The email may be a "spoofed" email, where the sender's address is forged
This warning appears when security checks like SPF or DKIM fail, suggesting that the email might not actually be from the person or organization it claims to be from. You should be very cautious with such messages.