Gk Questions & Answers on Computer Science Set II

Oct 27, 2016, 11:33 IST

Gk Questions & Answers on Computer Science Set II consist of 10 MCQs are created while keeping in mind the relevance of the subject and its importance for an examination point of view. These MCQs helps the aspirant in the preparation of examinations like UPSC-Prelims, CDS, NDA, State-PSC, SSC, Railways etc.

Gk Questions & Answers on Computer Science Set II consist of 10 MCQs are created while keeping in mind the relevance of the subject and its importance for an examination point of view. These MCQs helps the aspirant in the preparation of examinations like UPSC-Prelims, CDS, NDA, State-PSC, SSC, Railways etc. It will concretise the reading experience of aspirants who are aspiring for cracking different competitive exams.

1. What is used to send control messages including errors?

A. IMPC packets

B. ICMP packets

C. PCIM packets

D. IPMC packets

Ans: B

2. What does SSL stand for?

A. Security  System Law

B. Security System Layers

C. Secure Socket Layer

D. None of the above

Ans:  C

3. What’s is the functionality of MAC (Media Access Control) ?

A. It an address unique to every piece of network hardware

B. It’s an address unique to every piece of computer

C. It is an hidden folder used for the recovery purpose

D. None of the above

Ans : A

4. In which year Deep Purple a super computer beat chess wizard Garry Kasparov?

A. 1996

B. 1998

C. 1995

D. 1997

Ans:  D

5. The speed of a CPU is measured in what?

A. Hertz (Hz)

B. Megahertz

C. Gigyabtyes

D. Byte

Ans : A

6. Which of the following is a command prompt command for Microsoft Windows?

A. Meg

B. Power

C. Ping

D. Petabyte

Ans : A

7. Which type of memory that is held even after the computer is turned off?

A. State Memory

B. Flash memory

C. Random Memory

D. Secure Memory

Ans : B

8. What will you associate the term Social Engineering when it comes to computers?

A. Hacking

B. Malware

C. Worms

D. Trojans

Ans : A

9. Name the service that allows you to receive emails?

A. POP7

B. POP2

C. POP1

D. POP3

Ans : D

10. Out of the following what kind of hackers are considered as good hackers?

A. Black Hat Hackers

B. Gray Hat Hackers

C. White Hat Hackers

D. Red Hat Hackers

Ans : C

Jagranjosh
Jagranjosh

Education Desk

Your career begins here! At Jagranjosh.com, our vision is to enable the youth to make informed life decisions, and our mission is to create credible and actionable content that answers questions or solves problems for India’s share of Next Billion Users. As India’s leading education and career guidance platform, we connect the dots for students, guiding them through every step of their journey—from excelling in school exams, board exams, and entrance tests to securing competitive jobs and building essential skills for their profession. With our deep expertise in exams and education, along with accurate information, expert insights, and interactive tools, we bridge the gap between education and opportunity, empowering students to confidently achieve their goals.

... Read More

Get here current GK and GK quiz questions in English and Hindi for India, World, Sports and Competitive exam preparation. Download the Jagran Josh Current Affairs App.

Trending

Latest Education News