Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
541
What is a "knowledge graph"?
Answer:
A knowledge base used by Google to enhance its search results with information gathered from a variety of sources
The knowledge graph is often displayed in a box on the right-hand side of the SERP.
542
In order to interpret XML documents one should
Answer:
Have a document type definition which defines the tags
XML documents are validated and interpreted using a DTD that specifies tag structure.
543
How can you protect your computer from becoming part of a botnet?
Answer:
All of the above
It is important to take steps to protect your computer from being infected with malware.
544
Which device works in full-duplex mode, allowing devices to send and receive data simultaneously?
Answer:
Switch
Switches operate in full-duplex mode, which means each port can send and receive data at the same time, eliminating collisions.
545
The term "client" can refer to:
Answer:
All of the above
The term "client" can be used to describe the user, the machine, or the program that is making a request.
546
What is a website?
Answer:
Address
A website is a collection of related web pages and content that is identified by a common domain name and published on at least one web server. In essence, its domain name serves as a unique address on the Internet that users can visit.
547
What is a "301 redirect"?
Answer:
A permanent redirect from one URL to another
301 redirects are often used when a website is moved to a new domain.
548
A router is a:
Answer:
Both a and b
A router is a hardware device that runs specialized software (firmware) to perform its routing functions.
549
What is a disadvantage of a wired network?
Answer:
It limits the mobility of devices.
Devices on a wired network are tethered by a cable, which restricts where they can be used.
550
What should you do if you receive a suspicious email?
Answer:
Delete the email without clicking on any links or opening any attachments
The safest course of action is to delete the email and report it as phishing if your email provider offers that option.