Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
61
What is 'data masking' commonly used for?
Answer:
To hide original sensitive data with realistic but false data, primarily for testing and training environments
Data masking (or data obfuscation) is a method of creating a structurally similar but inauthentic version of an organization's data. Its primary purpose is to protect sensitive data while allowing it to be used in non-production environments like development, testing, and training without exposing real sensitive information.
62
What is 'tokenization' in data security?
Answer:
Replacing sensitive data with a unique, non-sensitive identifier (token)
Tokenization is a data security technique where sensitive data (e.g., credit card numbers) is replaced with a randomly generated, non-sensitive equivalent (a token). This token can then be used in systems without exposing the original sensitive data, enhancing security and reducing compliance scope.
63
Which regulation focuses on the protection of personal data and privacy within the European Union?
Answer:
GDPR
The General Data Protection Regulation (GDPR) is a comprehensive data protection law in the European Union and European Economic Area. It imposes strict rules on how personal data is collected, stored, and processed.
64
What are coded entries used to gain access to a computer system called?
Answer:
Passwords
A password is a secret word or string of characters used for authentication to prove identity or gain access to a resource. It is the most common mechanism used to control access to computer systems, applications, and data.
65
What is the full form of DHCP in computer networking?
Answer:
Dynamic Host Configuration Protocol
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers for a given network.
66
What is a person known as who uses their expertise to gain unauthorized access to others' computers for malicious purposes?
Answer:
{'id': 4, 'text': 'Hacker'}
A hacker is an individual who uses their extensive knowledge of computers and networks to gain unauthorized access to systems. While the term can sometimes be used for ethical security experts, it commonly refers to those with malicious intent (also known as black-hat hackers or crackers).
67
What is the bit length of a standard Media Access Control (MAC) address?
Answer:
48 bits
A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. Standard MAC addresses are 48 bits long and are typically written as six groups of two hexadecimal digits.
68
What unit is used to measure the speed of an internet connection?
Answer:
Mbps
The speed of an internet connection, which refers to its data transfer rate or bandwidth, is typically measured in Mbps (megabits per second). GHz measures processor speed, dpi measures printer resolution, and ppm measures printer speed.
69
Good passwords contain on ________?
Answer:
Alphanumeric
A strong password typically combines multiple character types to make it harder to guess or crack. This includes a mix of uppercase and lowercase alphabets, numbers, and symbols. "Alphanumeric" refers to the combination of alphabets and numbers, which is a key component of a strong password.
70
What is a characteristic common to hackers?
Answer:
They access others' computers without permission
The defining characteristic of a hacker (in the common, negative sense) is the act of gaining unauthorized access to computer systems or networks. Their motivations can vary widely, from financial gain to political activism or simple curiosity, but the unauthorized access is the common element.