Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
81
Data security threats include:
Answer:
All of the above
Data security threats encompass a wide range of risks, including unauthorized access, data alteration, and system failures.
82
Which software is specifically designed to find and remove computer viruses?
Answer:
Antivirus
Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses.
83
A thief who watches what you type in order to steal your information is called:
Answer:
A. Snagging
Shoulder surfing is the direct observation technique of looking over someone's shoulder to get information like passwords or PINs.
84
What is a backup?
Answer:
An exact copy of system data
A backup is a copy of files and data created to ensure it can be recovered in case of data loss.
85
The term \_\_ describes viruses, worms, Trojans, and malicious scripts.
Answer:
Malware
Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software.
86
When a hacker contacts you by phone or email to steal your password, it is called what?
Answer:
Phishing
Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
87
A \_\_ is anything that can cause harm to a system.
Answer:
Threat
A threat is any potential danger or event that can compromise a system’s security or cause harm.
88
In the right setting, a thief can steal your data by watching you type. What is this called?
Answer:
Shoulder surfing
Shoulder surfing involves looking over someone’s shoulder to obtain confidential information as they type it.
89
Which of the following units is commonly used to quantify the data transfer rate or bandwidth of an internet connection?
Answer:
Mbps (megabits per second)
The speed of an internet connection, often referred to as its bandwidth or data transfer rate, is measured in 'megabits per second' (Mbps). This unit indicates how many millions of bits of data can be transferred each second.
Option B, GHz (gigahertz), is used to measure the clock speed of a processor, indicating how many cycles it completes per second.
Option C, DPI (dots per inch), measures the resolution of a printer or scanner, referring to the number of individual dots of ink or pixels it can produce or capture per linear inch.
Option D, PPM (pages per minute), is used to measure the printing speed of a printer, indicating how many pages it can output in one minute.
90
The \_\_ of a threat measures its potential impact on a system.
Answer:
Degree of harm
The degree of harm assesses the severity of the potential damage a threat could inflict on a system or organization.