Jagran Josh Logo

Gk Questions & Answers on Computer Science Set II

27-OCT-2016 11:33

    Gk Questions & Answers on Computer Science Set II consist of 10 MCQs are created while keeping in mind the relevance of the subject and its importance for an examination point of view. These MCQs helps the aspirant in the preparation of examinations like UPSC-Prelims, CDS, NDA, State-PSC, SSC, Railways etc. It will concretise the reading experience of aspirants who are aspiring for cracking different competitive exams.

    1. What is used to send control messages including errors?

    A. IMPC packets

    B. ICMP packets

    C. PCIM packets

    D. IPMC packets

    Ans: B

    2. What does SSL stand for?

    A. Security  System Law

    B. Security System Layers

    C. Secure Socket Layer

    D. None of the above

    Ans:  C

    3. What’s is the functionality of MAC (Media Access Control) ?

    A. It an address unique to every piece of network hardware

    B. It’s an address unique to every piece of computer

    C. It is an hidden folder used for the recovery purpose

    D. None of the above

    Ans : A

    4. In which year Deep Purple a super computer beat chess wizard Garry Kasparov?

    A. 1996

    B. 1998

    C. 1995

    D. 1997

    Ans:  D

    5. The speed of a CPU is measured in what?

    A. Hertz (Hz)

    B. Megahertz

    C. Gigyabtyes

    D. Byte

    Ans : A

    6. Which of the following is a command prompt command for Microsoft Windows?

    A. Meg

    B. Power

    C. Ping

    D. Petabyte

    Ans : A

    7. Which type of memory that is held even after the computer is turned off?

    A. State Memory

    B. Flash memory

    C. Random Memory

    D. Secure Memory

    Ans : B

    8. What will you associate the term Social Engineering when it comes to computers?

    A. Hacking

    B. Malware

    C. Worms

    D. Trojans

    Ans : A

    9. Name the service that allows you to receive emails?

    A. POP7

    B. POP2

    C. POP1

    D. POP3

    Ans : D

    10. Out of the following what kind of hackers are considered as good hackers?

    A. Black Hat Hackers

    B. Gray Hat Hackers

    C. White Hat Hackers

    D. Red Hat Hackers

    Ans : C

    Latest Videos

    Register to get FREE updates

      All Fields Mandatory
    • (Ex:9123456789)
    • Please Select Your Interest
    • Please specify

    • By clicking on Submit button, you agree to our terms of use
      ajax-loader
    • A verifcation code has been sent to
      your mobile number

      Please enter the verification code below

    Newsletter Signup
    Follow us on