Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
61
The most widely used technology in time-division switching is known as what?
Answer:
TSI
Time-Slot Interchange (TSI) is a fundamental technique in time-division switching where data from one time slot is moved to another.
62
Which type of email attachment poses the highest security risk if mishandled?
Answer:
Executable (.exe, .bat) files.
Executable files (.exe, .bat, .zip containing executables) pose the highest risk because they can contain and run malicious code directly on your system once opened, unlike text, image, or even PDF files which require exploits to be dangerous.
63
What is the main advantage of using IMAP over POP3 for email retrieval?
Answer:
IMAP keeps emails on the server, allowing access from multiple devices.
IMAP allows users to access their emails from multiple devices because a copy of the email remains on the server. POP3 typically downloads emails to a single device and deletes them from the server.
64
Which of the following is commonly used for secure communication over the internet, including email services?
Answer:
SSL/TLS
SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are cryptographic protocols designed to provide communication security over a computer network, widely used for secure email (e.g., SMTPS, IMAPS, POP3S).
65
Which email status indicates that an email tried to be delivered but was temporarily rejected by the recipient's server?
Answer:
Soft Bounce
A soft bounce indicates a temporary delivery issue, such as a full inbox, server downtime, or a message that's too large. The sending server will typically retry delivery later. A hard bounce is a permanent failure.
66
Why is it advisable to avoid including highly sensitive information (e.g., credit card numbers, social security numbers) directly in the body of an email?
Answer:
Emails are not inherently secure and can be intercepted or stored insecurely.
Email, by default, is not a secure communication channel. Sensitive data sent in plaintext can be intercepted, read, and misused by unauthorized parties. More secure methods like encrypted platforms or secure file transfer should be used.
67
Which email feature allows you to send an email to a recipient who will not see the other recipients?
Answer:
BCC
BCC (Blind Carbon Copy) ensures that each recipient receives a copy of the email, but their email addresses remain hidden from all other recipients, preserving their privacy.
68
A traditional cable TV network sends signals in which direction?
Answer:
Downstream
Traditional cable TV was a one-way broadcast system, sending signals downstream from the head end to the subscribers.
69
Which practice is most crucial for maintaining good email etiquette in a professional setting?
Answer:
Using clear subject lines and concise language.
Professional email etiquette emphasizes clarity and conciseness. A clear subject line helps recipients prioritize, and concise language ensures the message is easily understood.
70
What is the primary function of an email header?
Answer:
To provide metadata about the email, such as sender, recipient, subject, and routing information.
An email header contains control information of the message, including the sender, recipient, subject, date, and technical information about the message's journey through mail servers.