Search

Gk Questions & Answers on Computer Science Set II

Gk Questions Answers on Computer Science Set II consist of 10 MCQs are created while keeping in mind the relevance of the subject and its importance for an examination point of view. These MCQs helps the aspirant in the preparation of examinations like UPSC-Prelims, CDS, NDA, State-PSC, SSC, Railways etc.
Oct 27, 2016 11:33 IST
facebook Iconfacebook Iconfacebook Icon

Gk Questions & Answers on Computer Science Set II consist of 10 MCQs are created while keeping in mind the relevance of the subject and its importance for an examination point of view. These MCQs helps the aspirant in the preparation of examinations like UPSC-Prelims, CDS, NDA, State-PSC, SSC, Railways etc. It will concretise the reading experience of aspirants who are aspiring for cracking different competitive exams.

1. What is used to send control messages including errors?

A. IMPC packets

B. ICMP packets

C. PCIM packets

D. IPMC packets

Ans: B

2. What does SSL stand for?

A. Security  System Law

B. Security System Layers

C. Secure Socket Layer

D. None of the above

Ans:  C

3. What’s is the functionality of MAC (Media Access Control) ?

A. It an address unique to every piece of network hardware

B. It’s an address unique to every piece of computer

C. It is an hidden folder used for the recovery purpose

D. None of the above

Ans : A

4. In which year Deep Purple a super computer beat chess wizard Garry Kasparov?

A. 1996

B. 1998

C. 1995

D. 1997

Ans:  D

5. The speed of a CPU is measured in what?

A. Hertz (Hz)

B. Megahertz

C. Gigyabtyes

D. Byte

Ans : A

6. Which of the following is a command prompt command for Microsoft Windows?

A. Meg

B. Power

C. Ping

D. Petabyte

Ans : A

7. Which type of memory that is held even after the computer is turned off?

A. State Memory

B. Flash memory

C. Random Memory

D. Secure Memory

Ans : B

8. What will you associate the term Social Engineering when it comes to computers?

A. Hacking

B. Malware

C. Worms

D. Trojans

Ans : A

9. Name the service that allows you to receive emails?

A. POP7

B. POP2

C. POP1

D. POP3

Ans : D

10. Out of the following what kind of hackers are considered as good hackers?

A. Black Hat Hackers

B. Gray Hat Hackers

C. White Hat Hackers

D. Red Hat Hackers

Ans : C