Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Test Your CSC 101 Skills with Practice Questions

Ready to Ace Your CSC 101 Quiz? Dive into Our Computer Science Practice Test

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
Paper art showing chip lock, data streams on dark blue backdrop for computer generations cybercrime data processing quiz

Welcome to Master CSC Practice Questions - your free Computer Science Quiz designed to challenge your knowledge of computer generations, cybercrime, and data processing! Dive into our csc practice questions to test your grasp on essential concepts, from hardware basics to security threats. Preparing for a csc 101 quiz? This dynamic computer science practice test offers targeted cybercrime quiz questions and an engaging data processing quiz to sharpen your skills. Curious how you measure up? Explore our curated computer science questions or jump right into a fun basic computer science quiz. Start now and boost your confidence in minutes!

What was the primary technology used in first-generation computers?
Vacuum tubes
Transistors
Integrated circuits
Microprocessors
First-generation computers relied on vacuum tubes for computation and memory storage. They were large, consumed significant power, and produced a lot of heat, which impacted reliability. The next generation replaced them with smaller, more efficient transistors. Learn more about vacuum tubes.
Which device is considered the 'brain' of the computer?
CPU
RAM
Hard Drive
GPU
The CPU (Central Processing Unit) executes instructions and processes data, acting as the brain of the computer. It interprets and carries out basic arithmetic, logic, control, and input/output operations. Other components rely on the CPU to function. More on CPU functions.
In data processing, what does 'CPU' stand for?
Central Processing Unit
Computational Processing Utility
Central Program Unit
Control Programming Unit
CPU stands for Central Processing Unit, which performs the main processing in a computer. It fetches, decodes, and executes instructions from programs. Understanding this term is fundamental for computer architecture. Read more on CPU.
Which generation of computers introduced transistors?
Second Generation
First Generation
Third Generation
Fourth Generation
Second-generation computers replaced vacuum tubes with transistors, reducing size and power consumption while increasing reliability. This marked a significant leap over the first generation's bulky and heat-prone designs. Transistor technology dominated until integrated circuits appeared. History of the transistor.
What type of memory is typically volatile?
RAM
ROM
Flash memory
Hard drive
RAM (Random Access Memory) is volatile, meaning it loses its data when power is turned off. ROM and flash memory retain data without power. Understanding memory types is key in computer architecture. More on RAM.
Which of the following describes phishing?
Fraudulent emails to steal information
Installing malware automatically
Denial-of-service attack
Physical theft of hardware
Phishing involves sending deceptive emails or messages to trick users into revealing sensitive data. Attackers often impersonate trusted entities to gain credentials or personal information. It remains one of the most common cybercrimes. Learn about phishing.
What does HTTP stand for?
Hypertext Transfer Protocol
Hyperlink Text Transfer Program
Hypermedia Transfer Protocol
High Transfer Text Protocol
HTTP stands for Hypertext Transfer Protocol, which defines how messages are formatted and transmitted on the web. It governs communication between web browsers and servers. HTTPS is the secure version of this protocol. HTTP overview.
Which process handles data in fixed intervals rather than immediately?
Batch processing
Real-time processing
Online processing
Time-sharing,
Batch processing collects and stores data over time, then processes it as a group at scheduled intervals. This is efficient for large volumes but not suited for tasks requiring immediate response. Real-time processing handles data instantly. Batch vs. real-time.
Which generation of computers introduced integrated circuits?
Third Generation
Second Generation
Fourth Generation
First Generation
Third-generation computers used integrated circuits (ICs), embedding multiple transistors on a single chip. This greatly improved performance, reliability, and reduced cost. Integrated circuits paved the way for microprocessors. Integrated circuits timeline.
What device is used to connect networks over telephone lines?
Modem
Router
Switch
Hub
A modem (modulator-demodulator) converts digital signals from a computer into analog for transmission over phone lines, and vice versa. Routers and switches operate at different layers of network communication. Modems were central to early internet access. How modems work.
Which term describes malicious software designed to replicate itself?
Worm
Trojan horse
Adware
Spyware
A worm is standalone malware that replicates itself to spread across computers and networks. Unlike viruses, worms do not need to attach to host programs. They can consume bandwidth and harm systems. Computer worm definition.
Which memory type typically retains data without power?
ROM
RAM
Cache
Registers
ROM (Read-Only Memory) is non-volatile and retains data even when the system is powered off. It stores firmware and bootloader code. RAM and cache are volatile and lose their content without power. ROM vs. RAM.
Which protocol is used to securely browse the web?
HTTPS
FTP
SMTP
SNMP
HTTPS (Hypertext Transfer Protocol Secure) encrypts web traffic using SSL/TLS, ensuring confidentiality and integrity. It is the standard for secure communication on the internet. HTTP alone does not provide encryption. About HTTPS.
What is the role of an operating system?
Manage hardware and software resources
Design application user interfaces
Store user documents
Compile source code
An operating system manages hardware (CPU, memory, I/O) and provides services to applications. It handles scheduling, resource allocation, and security. Without it, software cannot interact with hardware effectively. Operating system overview.
In batch processing, data is:
Collected and processed periodically
Processed immediately upon input
Handled only in real time
Used exclusively by mainframes
Batch processing collects data over a period and processes it together at scheduled times. It is efficient for large volumes where immediate processing is not critical. Real-time systems process data instantly. IBM on batch processing.
What is normalization in database design primarily used for?
Reducing data redundancy
Encrypting sensitive fields
Improving user permissions
Speeding up network access
Normalization organizes database tables to minimize redundancy and dependency. It breaks data into related tables and defines relationships. This reduces anomalies during insert, update, and delete. Database normalization explained.
Which cybercrime involves exploiting software vulnerabilities without disclosure?
Zero-day attack
Phishing
Spam
Brute force
A zero-day attack exploits an unpatched vulnerability before the vendor can issue a fix. The name refers to developers having 'zero days' to address the flaw. These are highly valuable to attackers. Zero-day threats.
What component schedules and dispatches processes in an operating system?
CPU scheduler
Memory manager
I/O handler
File system
The CPU scheduler selects which process in the ready queue gets CPU time next, optimizing utilization and throughput. It uses algorithms like Round Robin or Priority Scheduling. Other components manage memory and I/O. CPU scheduling details.
Which protocol is used to securely transfer files over SSH?
SFTP
FTPS
TFTP
SCP
SFTP (SSH File Transfer Protocol) provides secure file transfer over a secure shell (SSH) connection. Unlike FTPS, it uses a single port and encrypts both commands and data. SCP is simpler but less feature-rich. About SFTP.
What is a primary advantage of virtual memory?
Allows processes to exceed physical RAM
Eliminates the need for swap space
Ensures all data stays in cache
Avoids fragmentation entirely
Virtual memory uses disk space to extend available memory beyond physical RAM, enabling larger or more simultaneous processes. It transparently swaps pages in and out of physical memory. However, excessive swapping can degrade performance. Virtual memory explained.
Which technique ensures data integrity during transmission?
Checksum
Encryption
Multiplexing
Routing
A checksum computes a small-sized datum from a block of digital data to detect errors in transmission or storage. If data is altered, the checksum won't match, signaling corruption. Encryption secures data but does not verify integrity alone. Checksum definition.
What is the function of an index in a database?
Speed up data retrieval
Enforce referential integrity
Encrypt records
Compress tables
An index is a database structure that improves query performance by providing quick lookup of rows. It works like an index in a book, pointing to the location of data. However, too many indexes can slow writes. Database indexing.
Which layer of the OSI model handles end-to-end communication?
Transport layer
Network layer
Data link layer
Session layer
The transport layer (Layer 4) ensures reliable end-to-end communication, flow control, and error checking. Protocols like TCP and UDP operate at this layer. The network layer routes packets between networks. OSI transport layer.
What is the primary goal of encryption in data processing?
Protect confidentiality of data
Improve data compression
Enhance processing speed
Ensure data ordering
Encryption transforms plaintext into ciphertext to prevent unauthorized access, ensuring confidentiality. It can also provide integrity and authentication when combined with other techniques. It does not inherently speed up processing. Encryption basics.
Which cybercrime involves overwhelming a system with traffic?
Denial-of-service attack
Man-in-the-middle attack
Phishing
SQL injection
A Denial-of-Service (DoS) attack floods a service or network with excessive traffic to make it unavailable to legitimate users. Distributed DoS (DDoS) uses multiple systems to amplify impact. It targets capacity rather than data theft. DoS attacks explained.
What is data mining primarily used for?
Discovering patterns in large datasets
Encrypting sensitive data
Archiving old records
Backing up databases
Data mining uses statistical and machine learning techniques to identify patterns, correlations, and anomalies in large datasets. It supports decision-making in business, science, and healthcare. It is not used for encryption or backup. Data mining overview.
Which programming concept allows treating data and methods as a single unit?
Encapsulation
Inheritance
Polymorphism
Recursion
Encapsulation bundles data and methods into a single unit called an object, restricting direct access to some of its components. It enhances modularity and security. Other principles include inheritance and polymorphism. Encapsulation in OOP.
Which scheduling algorithm may cause starvation of low-priority processes?
Priority scheduling
Round-robin
First-Come, First-Served
Shortest Job Next
Priority scheduling executes processes based on priority, which can starve low-priority tasks if high-priority ones dominate. Round-robin and FCFS are fairer in terms of wait time. Shortest Job Next can also lead to starvation for long jobs. CPU scheduling starvation.
What is the main purpose of RAID technology in data storage?
Improve performance and fault tolerance
Encrypt data at rest
Compress files on disk
Provide network file sharing
RAID (Redundant Array of Independent Disks) combines multiple physical disks to improve performance, reliability, or both. Different RAID levels trade-off speed, redundancy, and capacity. It does not inherently encrypt or compress data. RAID explained.
In encryption, what does AES stand for?
Advanced Encryption Standard
Asymmetric Encryption System
Authenticated Encryption Scheme
Advanced Encoding System
AES (Advanced Encryption Standard) is a symmetric encryption algorithm adopted by NIST in 2001. It is widely used for secure data encryption in applications and protocols. It supports key sizes of 128, 192, and 256 bits. NIST on AES.
Which database property ensures transactions are fully completed or fully rolled back?
Atomicity
Consistency
Isolation
Durability
Atomicity ensures that a transaction is treated as a single unit: either all of its operations succeed or none do. This prevents partial updates to the database. It is the 'A' in the ACID model. ACID properties.
What is a honeypot in cybersecurity?
Decoy system to detect attackers
Malware removal tool
Encryption algorithm
Backup server
A honeypot is a decoy system deployed to attract and monitor attackers, gathering information about their methods. It helps defenders understand threats and improve security. It is not a removal tool or backup. Cisco on honeypots.
Which memory management technique divides physical memory into fixed-size blocks?
Paging
Segmentation
Garbage collection
Swapping
Paging splits memory into fixed-size frames and maps them to pages in a process’s address space, eliminating external fragmentation. Segmentation uses variable-sized segments. Swapping moves entire processes in and out of memory. Paging overview.
Which principle ensures that a user can only access resources they're permitted to?
Principle of Least Privilege
Separation of Duties
Defense in Depth
Fail-safe defaults
The Principle of Least Privilege grants users only the access necessary to perform their jobs, reducing attack surfaces. Separation of Duties divides tasks to prevent fraud. Defense in Depth layers security controls. NIST on least privilege.
In distributed computing, what problem does consensus solve?
Agreeing on a single value among nodes
Balancing network load
Encrypting inter-node communication
Detecting hardware failure
Consensus algorithms, like Paxos or Raft, ensure distributed nodes agree on a single data value despite failures. This is essential for fault-tolerant distributed systems. It is not about load balancing or encryption. Raft consensus protocol.
What is the purpose of a cryptographic hash function?
Produce fixed-size digest from input
Encrypt data for confidentiality
Compress data without loss
Generate random numbers
Cryptographic hash functions take input data and produce a fixed-size, deterministic digest. They are collision-resistant and one-way, important for integrity checks and digital signatures. They do not provide confidentiality. Hash functions overview.
Which cyber law focuses on privacy and personal data protection in the EU?
GDPR
DMCA
HIPAA
SOX
The General Data Protection Regulation (GDPR) is a comprehensive EU law that protects personal data and privacy. It imposes strict rules on data processing and hefty fines for non-compliance. DMCA covers copyright, HIPAA covers health data in the US. GDPR official site.
What data structure is best for implementing LRU cache?
Doubly linked list with hash map
Binary search tree
Single linked list
Priority queue
An LRU cache uses a doubly linked list to track usage order and a hash map for O(1) access. Removing and adding nodes in a doubly linked list is constant time. BSTs and priority queues do not guarantee O(1) operations for both access and update. LRU cache implementation.
In GPU computing, what is SIMD?
Single Instruction, Multiple Data
Simultaneous Input, Multiple Data
Single Input, Multiple Devices
Symmetric Inter-process Multi Data
SIMD (Single Instruction, Multiple Data) allows one instruction to process multiple data points simultaneously, ideal for GPU parallelism. It accelerates tasks like graphics rendering and scientific computations. Other paradigms include MIMD. GPU computing basics.
Which consensus algorithm tolerates Byzantine faults?
Practical Byzantine Fault Tolerance
Two-Phase Commit
Paxos
Raft
Practical Byzantine Fault Tolerance (PBFT) is designed to tolerate Byzantine faults where nodes may act arbitrarily or maliciously. Paxos and Raft assume non-Byzantine failures. Two-Phase Commit is not fault-tolerant to Byzantine behavior. PBFT paper.
What is tail call optimization in compilers?
Reusing stack frame for recursive call
Inlining function calls
Loop unrolling
Register allocation
Tail call optimization replaces a function’s last call with a jump to avoid adding a new stack frame, preventing stack overflow. This optimization is common in functional languages. It is distinct from inlining or loop unrolling. Tail call optimization.
Which distributed storage system uses erasure coding for fault tolerance?
Ceph
NFS
SMB
FAT32
Ceph uses erasure coding to split data into fragments, encode it with redundant pieces, and distribute it across nodes. This improves storage efficiency compared to replication. NFS and SMB do not natively support erasure coding. Ceph documentation.
What is the CAP theorem in distributed systems?
Consistency, Availability, Partition tolerance
Caching, Authorization, Performance
Concurrency, Atomicity, Privacy
Compression, Accessibility, Protectability
The CAP theorem states that a distributed system can guarantee at most two of Consistency, Availability, and Partition Tolerance at the same time. This guides trade-offs in system design. It does not address caching or privacy. CAP theorem discussion.
In data streaming, what is backpressure?
Signaling sender to slow data flow
Encrypting streaming data
Prioritizing certain packets
Caching data in buffer
Backpressure is a mechanism to control the flow of data between producer and consumer so the consumer is not overwhelmed. It signals the sender to slow or pause data transmission. It is different from buffering or encryption. Node.js streams backpressure.
0
{"name":"What was the primary technology used in first-generation computers?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What was the primary technology used in first-generation computers?, Which device is considered the 'brain' of the computer?, In data processing, what does 'CPU' stand for?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Understand Computer Generations -

    Gain a clear grasp of the major computer generations, their defining features, and how each era advanced hardware and software capabilities.

  2. Identify Cybercrime Techniques -

    Recognize common cybercrime methods covered in the quiz, from phishing to malware, and learn strategies to mitigate security threats.

  3. Demonstrate Data Processing Concepts -

    Explain key data processing stages, including input, storage, processing, and output, as tested in the data processing quiz section.

  4. Apply Test-Taking Strategies -

    Use proven techniques for time management, question analysis, and answer elimination to boost performance on this csc 101 quiz and other computer science practice tests.

  5. Analyze Knowledge Gaps -

    Pinpoint areas of strength and weakness through immediate quiz feedback, enabling targeted review and more efficient study sessions.

  6. Evaluate Exam Readiness -

    Assess your overall preparedness for formal exams by comparing your quiz results to key learning objectives in computer science fundamentals.

Cheat Sheet

  1. Computer Generations & Key Innovations -

    Since the 1940s, computer technology has progressed from vacuum tubes to AI-powered microprocessors, each generation marked by breakthroughs in speed and efficiency. Mnemonic "VTIM" (Vacuum tubes, Transistors, Integrated Circuits, Microprocessors) helps solidify this timeline (source: University of Cambridge).

  2. Cybercrime Classifications & Trends -

    When tackling csc practice questions on cybercrime quiz questions, categorize threats by impact on the CIA triad - confidentiality, integrity, and availability. Common examples include phishing, ransomware, and distributed denial-of-service (DDoS) attacks; note that ransomware incidents spiked 62% in 2021 (FBI Internet Crime Report). Learning these classes boosts your defense strategy.

  3. Data Processing Models: Batch vs. Real-Time -

    Understanding batch and real-time processing is essential for a computer science practice test or data processing quiz. In ETL (Extract, Transform, Load) batch jobs, data is processed in scheduled chunks, whereas real-time systems use streaming pipelines for instant insights (source: IBM Research). Choose the right model based on latency and volume requirements.

  4. Memory Hierarchy & Access Time Formula -

    Review the memory hierarchy - from registers and cache to RAM and disk - to optimize performance. Use the formula Tavg = h×Th + (1−h)×Tm, where h is cache hit ratio, Th is hit time, and Tm is miss penalty (source: MIT OpenCourseWare). High cache hit ratios dramatically reduce average access times.

  5. Algorithm Complexity & Big O Notation -

    Master Big O fundamentals for your csc 101 quiz by mapping common algorithms: O(n) for linear search, O(n log n) for merge sort, and O(n²) for bubble sort. Remember "NLM" as a quick mnemonic - N ≈ linear, L ≈ log, M ≈ squared (source: CLRS Introduction to Algorithms). Comparing growth rates ensures efficient algorithm selection.

Powered by: Quiz Maker