Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1
Is antivirus software for mobile phones (e.g., Android, iOS) necessary?
Answer:
Yes, mobile devices can be infected with malware, and security apps can help protect against threats like malicious apps and phishing.
While mobile operating systems have strong built-in security, they are not immune to malware. Malicious apps can be downloaded from unofficial app stores or even sneak into official ones. Security software can add an important layer of protection.
2
If you see your mouse moving on the screen and programs opening on their own, you may be a victim of a:
Answer:
Remote Access Trojan (RAT).
Seeing your cursor move on its own is a very strong indication that someone is remotely controlling your computer. This level of control is a key feature of a Remote Access Trojan (RAT).
3
What type of malware is disguised in email attachments or free software downloads?
Answer:
Trojan Horse
Trojan horses appear harmless but contain malicious code that activates upon execution.
4
The WannaCry worm's spread was enabled by a Windows vulnerability known as "EternalBlue," which was allegedly developed by what organization?
Answer:
The U.S. National Security Agency (NSA)
The EternalBlue exploit, which targets a vulnerability in Microsoft's SMB protocol, was widely reported to have been developed by the NSA and was later leaked by the "Shadow Brokers" hacker group. It was then repurposed by other criminals to create WannaCry.
5
What computer virus gained notoriety for its extensive global reach?
Answer:
I Love You
The 'I Love You' worm, also known as LoveLetter, spread rapidly in May 2000. It propagated through email with the subject line "ILOVEYOU" and an attachment. It caused widespread damage estimated in the billions of dollars and is considered one of the most virulent computer viruses ever.
6
Viruses that activate at a specific time or date are called:
Answer:
Time bombs
Time bombs are malicious programs set to activate on a particular date or after a certain event has occurred.
7
A program that appears to be a legitimate application, such as a game or utility, but contains malicious functions is known as a:
Answer:
Trojan Horse
A Trojan Horse, or Trojan, is a type of malware that misleads users of its true intent. It is disguised as or embedded within legitimate software, and when executed, it can perform malicious actions like creating a backdoor for remote access.
8
The MyDoom worm (2004) is famous for what reason?
Answer:
It is considered the fastest-spreading email worm in history.
?
9
If you suspect your computer is infected, what is one of the first steps you should take?
Answer:
Disconnect the computer from the internet and any local networks.
Disconnecting from the network is a crucial first step. This prevents the malware from spreading to other devices on your network and stops it from communicating with the attacker's servers, which could involve sending your data or receiving further instructions.
10
What is "heuristic analysis" in the context of antivirus software?
Answer:
A method of detecting new, previously unknown malware by examining its behavior and code structure for suspicious characteristics.
Heuristic analysis is a more advanced detection method that doesn't rely on known signatures. Instead, it looks for suspicious traits or behaviors in a program (e.g., trying to modify system files, replicating itself) to identify malware that has never been seen before.