Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1
Which program can be used for sending and receiving emails?
Answer:
Outlook Express
Outlook Express is an email client designed for composing, sending, receiving, and managing email messages.
2
The "Do Not Track" option for read receipts is designed to:
Answer:
Prevent Outlook from ever sending a read receipt, regardless of what the sender requests
This is a privacy setting. It allows you to choose to never send read receipts, or to be prompted each time one is requested, giving you control over when you notify a sender that you've viewed their message.
3
If you are unsure about an email's legitimacy, what should you do?
Answer:
Delete it and do not click any links or open any attachments
The "when in doubt, throw it out" rule is the safest approach. Interacting with a potentially malicious email in any way, including replying, can be risky.
4
The "Phishing" protection level in the Junk Email Options specifically targets:
Answer:
Messages with links that are known to be malicious or fraudulent
This part of the filter is designed to identify and disable links in emails that point to known phishing websites, adding another layer of protection against fraud.
5
A strong password for your email account should ideally include:
Answer:
A mix of uppercase letters, lowercase letters, numbers, and symbols
Password complexity makes it much harder for attackers to guess your password or crack it using automated tools.
6
Why is it generally unsafe to enable macros in an attachment from an unknown source?
Answer:
Macros can contain malicious code that can infect your computer with a virus or ransomware
Macros are powerful scripts that can automate tasks, but this power can be abused by attackers. Malicious macros are a very common way to deliver malware via email attachments like Word or Excel files.
7
If you mark an email as "Not Junk," Outlook will:
Answer:
Move the message to your Inbox and try to learn from this action to improve future filtering
This action corrects the filter's mistake (a "false positive") and helps to train it so that emails from that sender or similar emails are less likely to be marked as junk in the future.
8
A recipient of your encrypted email must have what to read it?
Answer:
Their own digital ID or a one-time passcode to prove their identity
To decrypt a message, the recipient needs the corresponding key. In an S/MIME system, this is their private key. In Microsoft 365 encryption, they may need to sign in or use a code to access the secure message portal.
9
Which action helps to protect you from malware?
Answer:
Keeping your Outlook application and antivirus software up to date
Software updates often contain patches for newly discovered security vulnerabilities. Keeping your software current is one of the most important steps in staying protected.
10
The red ribbon or certificate icon in the message list or message header indicates that the email is:
Answer:
Digitally signed
The ribbon/certificate icon is the symbol used to show that a message has a valid digital signature, verifying the sender's identity.