Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
11
Which concept describes the ability of a network to provide different levels of service to different types of network traffic?
Answer:
Quality of Service (QoS)
Quality of Service (QoS) refers to the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This is crucial for applications sensitive to delay, like VoIP and video conferencing.
12
What is the primary purpose of a Content Delivery Network (CDN)?
Answer:
To distribute content geographically closer to users to improve delivery speed and reliability.
A CDN's primary purpose is to improve content delivery by replicating content across multiple servers globally and serving it from the server closest to the user, reducing latency and increasing bandwidth efficiency.
13
Which computing paradigm delivers on-demand computational resources, data storage, and software applications to users over a network, typically the internet?
Answer:
Cloud Computing
Cloud computing is an on-demand delivery model that provides computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (the cloud). Instead of owning computing infrastructure or data centers, users can access services like computation, storage, and applications as utilities. This differs from: * **Distributed Computing:** This involves multiple computers working together on a single problem, often in a peer-to-peer fashion, but doesn't necessarily imply on-demand service delivery over a network. * **Parallel Computing:** This focuses on performing multiple calculations or processes simultaneously to achieve faster computation, typically within a single system or closely coupled systems. * **Virtual Computing (or Virtualization):** This is a technology that allows a single physical machine to run multiple virtual instances (like virtual machines), abstracting hardware. While cloud computing heavily utilizes virtualization, virtualization itself is not the entire service model of delivering resources over a network.
14
Which of the following best describes the primary role of a proxy server within a network architecture?
Answer:
To mediate client requests for network resources, often enhancing security and performance.
A proxy server functions as an intermediary, forwarding requests from clients to other servers and then returning the responses to the client. This mediation allows for several functions, including caching web pages to improve performance by reducing bandwidth usage and latency, filtering access to certain websites or content, and enhancing security by masking the client's IP address and potentially inspecting traffic for malicious content. While proxies can contribute to security and performance, their main function is to act as that intermediary for resource requests. Options B, C, and D describe the roles of a database server, a VPN or encryption system, and a DHCP server, respectively, which are distinct from the primary function of a proxy server.
15
What is the concept of 'Internet of Things' (IoT)?
Answer:
A vast network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
The IoT refers to the extension of internet connectivity beyond standard devices like computers and smartphones to a diverse range of physical objects and everyday items. These 'things' are embedded with technology to communicate and interact over the internet, collecting and exchanging data.
16
Which of the following describes the function of DNSSEC?
Answer:
It adds a layer of security to the Domain Name System (DNS) by authenticating DNS data.
DNSSEC (Domain Name System Security Extensions) adds cryptographic signatures to DNS records, allowing resolvers to verify the authenticity and integrity of DNS responses, thereby protecting against DNS spoofing and cache poisoning attacks.
17
What is the primary role of an Internet Exchange Point (IXP)?
Answer:
To facilitate the direct interconnection and peering of independent Internet Service Providers (ISPs).
An IXP is a physical infrastructure through which Internet service providers (ISPs) and Content Delivery Networks (CDNs) exchange Internet traffic between their networks. This allows them to effectively share traffic, reduce costs, and improve network efficiency and performance.
18
In the context of web performance, what does client-side caching primarily achieve?
Answer:
It stores copies of frequently accessed web resources on the user's local device to reduce server requests and load times.
Client-side caching involves storing local copies of web resources (like images, CSS, JavaScript) in the user's browser. This reduces the need to re-download these resources on subsequent visits, leading to faster page load times and reduced server load.
19
Which acronym correctly represents a technology that establishes a secure and encrypted connection over a less secure network, such as the internet?
Answer:
Virtual Private Network (VPN)
VPN stands for Virtual Private Network. This technology creates a secure and encrypted tunnel between a user's device and a remote server over a public network, like the internet. This encryption safeguards data from eavesdropping and interference, while a private IP address from the VPN server masks the user's actual IP address, enhancing anonymity and cybersecurity. Options B, C, and D are incorrect interpretations of the acronym's meaning, as 'Private' accurately reflects the technology's core function of providing a secure and isolated connection.
20
Which security measure, implemented as either hardware or software, is designed to prevent unauthorized individuals or entities from gaining access to a private computer network?
Answer:
Firewall
A firewall acts as a critical barrier in network security. It can be a hardware device, a software application, or a combination of both. Its primary function is to monitor and filter incoming and outgoing network traffic based on a defined set of security rules. This allows it to block malicious traffic, restrict access to specific services, and generally protect a private network from unauthorized access from external networks, such as the internet. While other options like IPS, SSL, and VPN contribute significantly to network security, they serve different, albeit related, functions. An IPS actively detects and prevents intrusions, SSL encrypts data transmission, and a VPN creates a secure, encrypted connection over a public network. However, the core function of preventing unauthorized *access* to the network itself is best described by a firewall.