Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
Which of the following best describes a self-extracting archive?
Answer:
A standalone executable program designed to decompress and unpack its bundled files without requiring external archiving software.
A self-extracting archive, often referred to as an SFX (Self-eXtracting) archive, is a special type of compressed file that includes an executable program (like an .exe file in Windows). When you run this executable, it automatically unpacks and decompresses the archived contents to a specified location, without the need for the user to have a dedicated archiving utility (like WinZip, 7-Zip, or WinRAR) installed on their system. This makes it highly convenient for distributing files to users who may not possess the necessary decompression software, ensuring they can easily access the contents.
22
In an operating system, what is the primary function of file permissions?
Answer:
To regulate who can read, modify, or execute specific files, thereby safeguarding data integrity and privacy.
File permissions are a fundamental security mechanism within operating systems. Their primary purpose is to define and enforce access controls on files and directories. This means they dictate which users or groups have specific rights, such as reading the file's content, writing (modifying or deleting) the file, or executing it (if it's a program). By implementing these controls, file permissions prevent unauthorized access, accidental modifications, or malicious actions, thus ensuring data confidentiality, integrity, and availability. Options A, C, and D describe other functionalities (organization, logging, optimization) that are separate from the core role of access control provided by file permissions.
23
In a hierarchical file system, what is the designation for the directory that is immediately above and contains the current working directory?
Answer:
The parent directory
In hierarchical file systems, such as those used in Windows, macOS, and Linux, directories are organized in a tree-like structure. The 'parent directory' is the directory that is directly above the current directory in this hierarchy, serving as the container for the current directory. For example, if you are in `/home/user/documents`, then `/home/user` is the parent directory. The 'root directory' (Option B) is the top-most directory of the entire file system (e.g., `/` on Linux/macOS or `C:\` on Windows). A 'child directory' (Option C) is a directory located inside the current directory. The 'home directory' (Option D) is a specific directory assigned to a user, typically containing their personal files, but it is not universally the immediate parent of any given current directory.
24
When you choose to 'save' a document or file within a software application, which fundamental file system operation is primarily being performed?
Answer:
Transferring data from the application's memory to persistent storage.
The 'save' operation in an application primarily involves the 'write' file system operation. When a user saves a file, the data currently held in the application's volatile memory (RAM) is transferred to a persistent storage medium, such as a hard drive, SSD, or USB drive. This process overwrites existing data if the file already exists, or creates new data if it's a new file being saved for the first time. * **Option A (Read):** Reading involves retrieving data *from* storage *into* the application's memory. * **Option B (Create):** While a new file is created during a 'Save As' or initial save, the fundamental action of putting data into that file is writing. 'Create' often refers more specifically to the initial allocation of file system metadata. * **Option D (Delete):** Deleting involves removing a file from the storage system.
25
When managing digital files, what is the fundamental distinction between performing a 'copy' operation versus a 'move' operation?
Answer:
A 'copy' operation duplicates the selected item, leaving the original in its initial location and creating an identical item in a new destination; whereas a 'move' operation transfers the original item from its initial location to a new destination, effectively removing it from the starting point.
Option A accurately describes the core differences. A 'copy' operation is non-destructive to the original file or folder. It creates an identical replica at the specified new location, meaning you end up with two versions of the data – one at the source and one at the destination. In contrast, a 'move' operation is destructive to the original's location. It transfers the entire file or folder from its original spot to the new destination, deleting it from the source after the transfer is complete. This results in only one version of the data existing in the new location. Options B incorrectly reverses the definitions. Option C is incorrect because the outcomes are fundamentally different (duplicate vs. relocate). Option D is incorrect as both 'copy' and 'move' operations can be applied to both individual files and entire folders.
26
In a hierarchical file system, which element serves as the ultimate parent and origin point for all other directories and files?
Answer:
The root directory, from which all other paths originate.
The correct answer is 'C) The root directory'. In a hierarchical file system, the root directory is the common ancestor of all other directories and files. It forms the base of the file system tree structure, and every single file or subdirectory can be traced back to this root. Its significance lies in being the absolute starting point for any file path, meaning all absolute paths begin with the root directory symbol (e.g., '/' in Unix-like systems or 'C:\' for Windows drives).
27
In a controlled access, multi-user computing environment, which entities typically possess the authorization to modify a file's access permissions?
Answer:
The file's designated owner and the system administrator (or equivalent privileged user).
In multi-user operating systems (like Linux, Unix, macOS, or Windows Server environments), file permissions are a fundamental security mechanism. The 'owner' of a file, typically the user account that created it, holds primary control over that file. This control includes the crucial ability to set, revoke, or change the permissions (read, write, execute) for themselves, their group, and other users. Additionally, the 'system administrator' (often referred to as 'root' on Unix-like systems) possesses overarching privileges across the entire system. This superuser account can override all file permissions and modify them for any file, regardless of its owner, for administrative and maintenance purposes. Therefore, both the file's owner and the system administrator have the authority to alter file permissions.
28
Which of the following best describes the primary function and characteristics of a file saved with the `.rar` extension?
Answer:
It is a widely used archive file format designed for data compression and error recovery, often containing multiple files and directories.
A '.rar' file signifies a Roshal Archive file, which is a proprietary archive file format developed by Eugene Roshal. Its primary purpose, much like a '.zip' file, is to compress one or more files and folders into a single, smaller package. This compression reduces storage space and speeds up file transfer. RAR files are known for their strong compression algorithms, support for multi-volume archives (splitting a large archive into smaller parts), and robust error recovery features, which can help repair corrupted archives. While there are open-source tools that can decompress RAR files, creating them typically requires the proprietary WinRAR software.
29
In a typical file system, what fundamental aspect of interaction do permissions assigned to a directory primarily regulate?
Answer:
The authorized actions, such as listing a directory's contents, creating new files, or removing existing files within it.
Directory permissions fundamentally control what actions users or groups can perform *within* that directory. Read permission on a directory allows listing its contents (seeing what files are there). Write permission allows creating new files or subdirectories and deleting existing ones. Execute permission on a directory allows users to 'enter' it, access its subdirectories, and access files within it (assuming appropriate file permissions). Options A, C, and D describe attributes that are generally not managed by standard directory permissions.
30
For effective long-term digital file management and easy retrieval on a computer, which organizational strategy provides the best balance of structure, scalability, and accessibility?
Answer:
Creating a tiered system using nested folders (directories) to categorize files based on logical relationships.
A hierarchical system of directories, commonly referred to as folders and subfolders, is widely recognized as the most effective and scalable solution for organizing digital files. This method allows for the logical grouping of related files, creating an intuitive structure that mirrors real-world organizational paradigms. As the number of files increases, this hierarchical approach maintains order, improves navigability for browsing, and simplifies the retrieval of specific documents or projects. For instance, a main folder titled 'Work' might contain subfolders for 'Clients,' 'Projects,' and 'Admin,' with further subfolders within each, allowing for clear segregation and easy contextual understanding of file locations. Option A, placing all files in a single, unorganized folder, quickly leads to 'digital clutter.' While search functions can locate specific files, navigating the sheer volume of results becomes inefficient, and understanding the relationships between files is nearly impossible without the context of meaningful groupings. This approach is neither scalable nor efficient for complex file management. Option C, storing all frequently used files directly on the desktop, offers immediate accessibility but is not a sustainable or scalable organizational strategy. Desktops quickly become cluttered, hindering visual clarity, potentially slowing down system performance, and lacking any inherent categorization. It fails to provide a structured method for managing a growing number of files. Option D, utilizing a flat structure with tags instead of distinct folders, can be a valuable supplementary tool, especially for cross-referencing or dynamic categorization. However, as a primary organizational method, it lacks the clear, tree-like structure that hierarchical folders provide, which is essential for visual browsing, understanding nested relationships, and offering a robust framework for long-term file management. Without folders, grasping the overall organization or intuitively navigating to a specific project becomes significantly more challenging.