Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1
Which of the following acronyms correctly represents the technology used to establish a secure, encrypted connection over a less secure network, like the internet?
Answer:
Virtual Private Network
VPN stands for Virtual Private Network. This technology creates a secure and encrypted 'tunnel' over a public network, such as the internet. By doing so, it allows users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network, thereby ensuring enhanced privacy and security for their online activities. This is crucial for protecting sensitive information from potential eavesdroppers or data breaches when using public Wi-Fi or accessing remote resources securely.
2
Which security measure, implemented as either hardware or software, is specifically designed to prevent unauthorized access to a computer network?
Answer:
Firewall
A firewall acts as a critical network security system, monitoring and controlling incoming and outgoing network traffic. It operates based on a set of predefined security rules, creating a robust barrier between a trusted internal network and an untrusted external network, such as the internet. Its primary function is to block unauthorized access while permitting legitimate traffic, thereby safeguarding the network from various cyber threats. Option A, an Intrusion Prevention System (IPS), is similar but focuses more on actively blocking detected threats rather than just filtering traffic based on rules. Option C, Secure Socket Layer (SSL) (now largely Transport Layer Security - TLS), is a protocol for encrypting communication between a web server and a web browser, not a system for blocking network access. Option D, Antivirus Software, protects individual devices from malicious software but does not control network-wide access.
3
What is the main challenge presented by Network Address Translation (NAT) in the context of advanced internet concepts?
Answer:
It complicates end-to-end connectivity and peer-to-peer communication.
NAT, while conserving IPv4 addresses, masks internal IP addresses behind a single public IP. This makes it difficult for external devices to initiate connections to specific internal devices directly, complicating services that rely on end-to-end connectivity like peer-to-peer applications.
4
Which computing model delivers on-demand computational resources, data storage, and software applications to users over a network, typically the internet, allowing for flexible and scalable access without direct management of underlying infrastructure?
Answer:
Cloud Computing
Cloud Computing is an IT service delivery model where computing resources (like servers, storage, databases, networking, software, analytics, and intelligence) are provided as services over the internet ('the cloud') on an on-demand basis. Users can access these services without owning or directly managing the physical infrastructure, paying only for what they use. This contrasts with: * **Distributed Computing:** This involves multiple computers working together to solve a single problem, often across a network, but doesn't necessarily imply delivery 'as a service' or on-demand resource provisioning. * **Parallel Computing:** This is a type of computation in which many calculations or the execution of processes are carried out simultaneously. It focuses on the processing method rather than the delivery model. * **Virtual Computing (or Virtualization):** This is a technology that creates virtual versions of hardware resources (like servers or operating systems). While foundational to cloud computing, it describes the underlying technology rather than the service delivery model itself.
5
Which of the following is a key characteristic of the Dark Web?
Answer:
It is accessible only via specific software, configurations, or authorizations, often for anonymity.
The Dark Web is a part of the internet that is not indexed by standard search engines and requires specific software, configurations, or authorizations to access, most commonly Tor. It is often used for anonymity, both for legitimate and illicit purposes.
6
Which acronym correctly identifies a technology used to establish a secure and encrypted connection over a less secure network, such as the internet?
Answer:
Virtual Private Network
VPN stands for Virtual Private Network. This technology creates a secure, encrypted 'tunnel' over a public network, like the internet, allowing users to send and receive data as if their computing devices were directly connected to the private network. This enhances privacy and security by masking the user's IP address and encrypting their online activities, protecting data from potential eavesdropping or interception.
7
Which of the following best describes the primary role of a proxy server in a network architecture?
Answer:
It acts as an intermediary, forwarding client requests for resources (like webpages) to other servers and returning the responses to the client.
A proxy server fundamentally acts as an intermediary or a 'go-between' for client requests. When a client (e.g., a web browser) requests a resource (e.g., a webpage or a file), the request is sent to the proxy server. The proxy server then forwards this request to the actual server where the resource is hosted. Once the actual server responds, the proxy server receives the response and delivers it back to the client. This primary function can offer several benefits, including improved security (by masking client IP addresses), caching (to speed up access to frequently requested resources), and content filtering. Therefore, option A accurately describes its core role. Options B, C, and D describe functions typically handled by other network components such as VPNs/encryption protocols, DHCP servers, and firewalls, respectively, although a proxy server can sometimes incorporate some security features.
8
What is the primary function of a Border Gateway Protocol (BGP) router?
Answer:
To exchange routing and reachability information among autonomous systems (AS) on the internet.
BGP is the routing protocol used to exchange reachability information among autonomous systems (AS) on the internet. It helps determine the best paths for data to travel across different networks, forming the backbone of internet routing.
9
Which acronym correctly represents the technology that establishes a secure, encrypted connection across a less secure network, often used to protect online privacy and access geo-restricted content?
Answer:
Virtual Private Network
VPN stands for Virtual Private Network. This technology creates a secure and encrypted 'tunnel' over a public network, like the internet, to protect a user's online activities from surveillance and interference. By routing internet traffic through a server operated by the VPN provider, it masks the user's IP address and encrypts their data, enhancing privacy and security, and often allowing access to content that might be geo-restricted.
10
What is the primary benefit of using IPv6 over IPv4?
Answer:
Larger address space to accommodate more devices and future growth.
IPv6 offers a vastly larger address space (128-bit addresses compared to IPv4's 32-bit addresses), solving the problem of IPv4 address exhaustion and providing ample addresses for the ever-increasing number of internet-connected devices.