Hardware
Operating System
Ethics
security
Misc
100

What is the name of the hardware component responsible for executing instructions and processing data?

Central Processing Unit (CPU)

100

How can an operating system manage memory efficiently, especially when multiple programs are running?

Using techniques such as dynamic memory allocation, paging, memory virtualization, and the use of a memory swapping system to move processes between RAM and the hard drive.

100

If you discover a colleague is plagiarizing research findings, how would you handle the situation ethically?

 I would first approach the colleague privately and express my concerns, emphasizing the ethical implications of plagiarizing research findings. If the issue persists or escalates, I would report it to the appropriate authorities, such as a supervisor or research ethics committee. The goal is to uphold academic integrity and ensure a fair and ethical research environment.

100

What is the difference between a virus and a worm?

A virus requires human action (like running a program) to spread, while a worm spreads automatically over a network without needing human interaction.

100

What is a file in the context of a computer?

In a computer, a file is a named collection of data stored on a storage device, such as a hard drive or SSD. Files can contain different types of data, including text, images, videos, and programs.

200

What type of memory is volatile and used to store data currently in use by the operating system?

RAM memory

200

What role does the kernel of an operating system play in the interaction between hardware and software?

The kernel acts as the fundamental intermediary between hardware and software. It provides an interface that allows programs (applications) to access hardware resources, such as the processor, memory, storage devices, and the network.

200

 How would you balance competing ethical obligations when faced with a situation where a decision favors one principle but harms another?

When faced with competing ethical obligations, I would carefully weigh the potential consequences of each course of action. I would consider the specific context, relevant ethical principles, and the stakeholders involved. The ultimate goal is to find a solution that minimizes harm and maximizes the overall good, while also maintaining my personal and professional integrity.

200

What are the three main principles of data security?

The three principles are confidentiality, integrity, and availability. Confidentiality means that data is only accessible to those authorized to view it. Integrity means that data is accurate and hasn't been altered without permission. Availability means that authorized users can access the data when they need it.

200

Explain the difference between RAM and ROM.

RAM (Random Access Memory) is a volatile memory that stores data and instructions for the CPU to access. ROM (Read-Only Memory) is non-volatile memory that typically contains essential system instructions.

300

What is the main function of the BIOS in a computer?

Start the system and configure the hardware

300

How does preemptive multitasking differ from cooperative multitasking in an operating system?

In preemptive multitasking, the operating system has complete control over when one process stops running and when another starts. In cooperative multitasking, each process decides when to relinquish control to other processes.

300

In the context of artificial intelligence, how do you ensure that AI systems are used ethically and do not perpetuate bias or discrimination?

To ensure ethical AI use, I would prioritize transparency in AI development and deployment. This involves understanding the data used to train AI models and identifying potential biases. I would also advocate for fairness and accountability by incorporating ethical considerations into AI design and monitoring for unintended negative consequences. Regular auditing and reevaluation of AI systems would also be crucial.

300

What is phishing and how can you identify it?

Phishing is a type of cyberattack where a malicious actor disguises themselves as a legitimate entity (like a bank or email provider) to trick users into revealing personal information. Look out for suspicious email addresses, requests for sensitive information in emails, and unusual links.

300

What is the difference between an input and an output device?

An input device is used to send data into the computer (e.g., keyboard, mouse). An output device is used to display data from the computer (e.g., monitor, printer).

400

What type of hardware is used to enter data into a computer, such as a keyboard or mouse?

Input Devices

400

What is a deadlock in an operating system, and what are some possible solutions to prevent or manage it?

A deadlock occurs when two or more processes are blocked indefinitely, waiting for another process to release a resource they need. Prevention or detection protocols can be used to prevent this, or detection and recovery can be implemented to manage it.

400

If you were a member of an ethics committee reviewing a research protocol, what key ethical questions would you consider before approving the study?

As a member of an ethics committee, I would focus on several key ethical considerations:

400

 What is the purpose of a firewall?

A firewall acts as a gatekeeper for your network. It examines incoming and outgoing network traffic and blocks or allows it based on pre-defined security rules. This helps prevent unauthorized access to your computer or network.

400

What is a software bug and how is it handled?

A software bug is a flaw or error in a computer program that causes it to behave incorrectly. Bugs are identified, reported, and then fixed by software developers through debugging and patching processes.

500

What hardware component is used to store data permanently and non-volatilely, such as a hard drive?

Storage Devices

500

How can an operating system achieve a high level of security and protection for a computer's data and hardware?

Implementing mechanisms such as user authentication, access permission assignment, data encryption, malware detection and prevention, and the use of firewalls to protect the network.

500

How would you approach ethical dilemmas in a rapidly evolving technological landscape, where new challenges and opportunities emerge constantly?

In a rapidly evolving technological landscape, I would embrace a proactive and adaptable approach to ethics. This involves staying informed about the latest technological developments and emerging ethical issues. I would actively engage in discussions with peers, experts, and policymakers to understand the ethical implications of new technologies.

500

What is encryption and why is it important?

Encryption is the process of converting data into an unreadable format, making it secure from unauthorized access. It's important because it protects sensitive information like passwords, bank details, and other confidential data when stored or transmitted.

500

 How can you protect your computer from malware?

You can protect your computer from malware by using antivirus software, keeping your software and OS updated, avoiding suspicious links and downloads, and being cautious about email attachments.

M
e
n
u