Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
31
Which file format typically utilizes 'lossy' data compression techniques to reduce its size, often by irreversibly discarding some information perceived as less critical?
Answer:
Digital video stream (.mp4)
Lossy compression is a data encoding method that achieves high compression ratios by intelligently discarding some information. This method is particularly effective for multimedia such as audio, images, and video, where small reductions in quality are often imperceptible to human senses, or the benefits of reduced file size/bandwidth outweigh a minor quality loss. MPEG-4 (.mp4) is a widely used digital multimedia container format that heavily relies on lossy compression for both its video (e.g., H.264/AVC, H.265/HEVC codecs) and audio (e.g., AAC codec) components. Executable files (.exe), plain text documents (.txt), and spreadsheet files (.xlsx) almost exclusively use lossless compression (if any) to ensure data integrity, as any discarded information would render the file unusable or incorrect.
32
Granting 'write' permissions to all users for a critical system directory poses a significant security risk. Which of the following best explains why this is considered a security vulnerability?
Answer:
Unauthorized users could maliciously or accidentally alter or remove essential operating system files, potentially leading to system instability, data corruption, or a complete system failure.
Granting 'write' permissions to all users for a system folder is a major security risk because it allows anyone with access to the system to modify, delete, or create files within that directory. Many critical operating system files reside in such folders. If these files are compromised (e.g., deleted, corrupted, or replaced with malicious versions), the system could become unstable, crash, or even be taken over by an attacker. This directly impacts the integrity, availability, and confidentiality of the system. Options A, C, and D are generally not direct or primary security risks associated with overly permissive write access to system folders.
33
Consider the filename 'My_Report_Final.docx'. Which term accurately describes the '.docx' component?
Answer:
The file extension
The '.docx' part of the filename 'My_Report_Final.docx' is known as the file extension. A file extension is a suffix, typically after a dot (.), at the end of a computer file name. It indicates the type or format of the file, allowing the operating system and applications to recognize how to open or handle the file. For example, '.docx' signifies a Microsoft Word document, '.pdf' indicates an Adobe Portable Document Format file, and '.jpg' denotes a JPEG image file. Options A, C, and D are not standard or accurate terminology for this component.
34
In which operating system family are file access permissions typically structured around distinct categories such as 'owner,' 'group,' and 'others'?
Answer:
Unix-like operating systems (e.g., Linux, macOS)
The 'owner,' 'group,' and 'others' (often abbreviated as 'ugo') permission model is a foundational and distinguishing characteristic of Unix-like operating systems, which include Linux, macOS (based on Darwin, a Unix-like kernel), and various BSD flavors. This model defines three primary entities for which read, write, and execute permissions can be independently set for each file and directory. While modern operating systems like Windows also have robust permission systems (ACLS - Access Control Lists), their structure is more granular and is not based on the simple 'owner/group/others' trinity. Android, being based on the Linux kernel, inherently uses a similar permission model at its core, but app-level permissions often abstract this underlying structure. However, when referring to the *primary structuring concept* for file system permissions, Unix-like systems are the definitive answer.
35
Which of the following actions is generally NOT considered a fundamental operation performed directly on an individual file?
Answer:
Initializing a storage device's file system structure.
File operations are actions performed directly on individual files. 'Renaming' (Option A) changes a file's name. 'Copying' (Option B) creates a duplicate of a specific file. 'Deleting' (Option D) removes a particular file. 'Formatting' (Option C), however, is an operation applied to an entire storage medium (like a hard drive, USB drive, or partition) to prepare it for use by establishing a new file system. It erases all data and sets up the directory structure, not an action on a single, existing file.
36
When naming a file in the Microsoft Windows operating system, which of the following symbols is generally prohibited from being used?
Answer:
Question mark (?)
Microsoft Windows operating systems enforce specific rules for file and folder naming, prohibiting certain characters due to their special functions within the system. The question mark (?) is a wildcard character used in search queries and is therefore reserved and invalid for use in file names. Other prohibited characters include: less than (<), greater than (>), colon (:), double quote ("), forward slash (/), backslash (\), vertical bar (|), and asterisk (*). The hyphen (-), period (.), and underscore (_) are all perfectly valid characters for use in Windows file names, often used for separating words or indicating file extensions.
37
In a typical file system, when a user is granted 'read-only' access to a specific file, what primary action are they permitted to perform?
Answer:
View the file's content without alteration.
The 'read' permission (often referred to as 'read-only' access) in file systems grants a user the ability to open and view the contents of a file. This permission explicitly prohibits any actions that would modify, delete, or rename the file. Its purpose is to allow consumption of information contained within the file while safeguarding its integrity from unauthorized changes.
38
Which of the following is the main purpose of applying file compression techniques?
Answer:
To decrease the overall storage space a file occupies.
File compression is a process that encodes information using fewer bits than the original representation. Its primary and most direct benefit is to reduce the file size. This reduction is achieved by identifying and eliminating redundant data within the file, allowing it to take up less storage space on a disk and be transmitted more quickly across networks. Options A, C, and D describe entirely different functionalities that are not the core purpose of file compression.
39
Which of the following statements accurately describes a significant drawback of utilizing lossy data compression techniques?
Answer:
The process of lossy compression inevitably results in an irreversible degradation of the file's original data quality.
Lossy compression works by permanently discarding some of the original data in a file that is deemed less important to human perception. While this leads to significantly smaller file sizes, the discarded information cannot be recovered, meaning the decompressed file will not be an exact replica of the original. This 'loss' of data translates directly into a permanent reduction in the quality of the file, which is its defining characteristic and primary disadvantage. Options A, B, and D are generally false. Lossy compression offers substantial file size reductions, is used on files of various sizes, and while compression can be computationally intensive, it doesn't always require a 'very powerful computer' for common lossy formats.
40
Which of these file types is generally ALREADY compressed and won't shrink much more if you try to zip it?
Answer:
.jpg (JPEG Image)
Formats like .jpg, .mp3, and .mp4 already use compression. Trying to compress them again with a tool like Zip will yield little to no size reduction because there is very little redundancy left to remove.