Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
71
What is the most common tool used to restrict access to a computer system?
Answer:
Passwords
Passwords are the most widely used authentication method for controlling access to computer systems. A user must provide the correct password associated with their user account to prove their identity and be granted access.
72
What does MAC stand for in computer networking?
Answer:
Media Access Control
MAC stands for Media Access Control. A MAC address is a unique hardware identifier assigned to every network interface card (NIC). It is used for communication between devices on the same local network at the Data Link Layer.
73
ARP stands for ________?
Answer:
Address resolution protocol
ARP stands for Address Resolution Protocol. It is a communication protocol used for discovering the link-layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
74
What protocol is used for automatic TCP/IP configuration assignment?
Answer:
DHCP
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used on IP networks. A DHCP server automatically assigns an IP address and other network configuration parameters to each device on a network, so they can communicate with other IP networks.
75
What role does a firewall play in computer networks?
Answer:
Prevent unauthorized access and cyberattacks
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet, to block malicious traffic and prevent unauthorized access.
76
The process of limiting a user’s access to application data based on privileges is:
Answer:
Access Control
Access control is a security technique that regulates who or what can view or use resources in a computing environment.
77
A hacker who contacts you by phone or email to steal your password is engaging in:
Answer:
Phishing
Phishing is a social engineering attack where a hacker attempts to acquire sensitive information by masquerading as a trustworthy entity.
78
Protecting data from destruction, disclosure, or modification is called what?
Answer:
Information security
Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information.
79
In the right setting, an attacker may steal your information simply by watching what you type.
Answer:
Shoulder surfing
Shoulder surfing is the direct observation of a user's screen or keyboard to steal sensitive information.
80
The ability to restrict or stop the collection, use, and sale of personal data is known as \_\_.
Answer:
Privacy
Privacy is the right of an individual to have control over their personal information and to be free from unauthorized surveillance.