293 Computer MCQ GK question in English हिन्दी

Share:

Are you preparing for SSC and Bank competitive exams? So you must have knowledge of Reasoning, Math as well as computer knowledge. In almost all government jobs examinations, some questions related to computers are asked under GK. Which have their own importance. Here you can check for detailed computer information and computer related questions which are very useful in any government examination. Here, I am providing the Computer GK Quiz Questions for learners who are preparing for competitive exams. In this post, I have updated the most important questions, answers with the latest Computer questions.


In networking, what is the purpose of a “subnet mask”?

A subnet mask identifies the network and host portions of an IP address. It allows efficient routing and management of IP address blocks. Subnetting improves security and performance of networks.

What does “overfitting” mean in machine learning?

Overfitting occurs when a model learns training data too well, including noise and outliers. It fails to generalize to new data. Techniques like cross-validation and regularization are used to prevent it.

What does “virtual memory” refer to?

Virtual memory allows a computer to compensate for shortages of physical memory by using disk space. This helps run larger applications by extending RAM virtually. It slows down performance compared to real RAM.

Which logic gate returns false only when all inputs are true?

NAND (Not AND) returns false only if all inputs are true. It is considered a universal gate because all logical operations can be built using only NAND gates. It’s essential in hardware design.

What does the term "deadlock" refer to in operating systems?

A deadlock occurs when processes wait indefinitely for resources held by each other. This creates a circular dependency, halting progress. Operating systems use algorithms to prevent or detect deadlocks.

Which of the following is NOT a functional programming language?

Pascal is a procedural programming language and not designed for functional programming paradigms. In contrast, Haskell and Scala are purely or partly functional. Python supports functional features but isn’t a functional language by design.

Which computer architecture uses a single bus for instructions and data?

von Neumann architecture stores both data and program instructions in the same memory. This design is simple but suffers from the "von Neumann bottleneck." It's used in most general-purpose computers.

banner ad

What is the full form of JSON?

JSON is a lightweight data interchange format based on JavaScript syntax. It's widely used in web APIs and data transmission. It is human-readable and easy to parse by machines.

17. In Python, what will print(0.1 + 0.2 == 0.3) output?

Due to floating-point precision errors, 0.1 + 0.2 results in a value slightly more than 0.3. Thus, the equality test returns False. This is a classic floating-point arithmetic caveat in computing.

Which scheduling algorithm is used in real-time operating systems?

Rate Monotonic Scheduling is a priority-based real-time algorithm where shorter cycles get higher priority. It ensures predictable task execution. It's commonly used in embedded and control systems.

In Big Data, what does the “4 Vs” stand for?

Big Data is defined by its high Volume (data size), Velocity (speed), Variety (types), and Veracity (uncertainty). These characteristics pose challenges for traditional data processing. The 4 Vs guide the design of scalable data systems.

Which layer of the OSI model is responsible for encryption and compression?

The presentation layer manages data formatting, translation, encryption, and compression. It acts as a translator between the application and the lower layers. This layer ensures readable data formats between systems.

What does RAID stand for in storage systems?

RAID is a method to combine multiple physical disks into one logical unit to increase performance or redundancy. Different RAID levels offer trade-offs between speed and fault tolerance. RAID is common in servers and critical storage systems.

What is the time complexity of binary search on a sorted array?

Binary search divides the search space in half with each step, resulting in logarithmic time complexity. It requires the input to be sorted. This makes it faster than linear search for large datasets.

banner ad

In blockchain technology, what is a “nonce”?

Nonce is a random or pseudo-random number used once in cryptographic communications. In blockchain mining, it's adjusted to find a valid hash. This process ensures block validity in Proof-of-Work systems.

Which protocol is used to send emails from a client to a server?

SMTP (Simple Mail Transfer Protocol) is used to send emails from the client to the mail server or between servers. POP3 and IMAP are used for retrieving emails. SMTP typically works on port 25 or 587.

Which of these is not a type of machine learning?

Synchronized learning isn't a category of machine learning. The three major types are supervised (labeled data), unsupervised (unlabeled data), and reinforcement (rewards/punishments). These approaches underpin AI systems today.

What does the acronym “DNS” stand for in networking?

DNS translates human-readable domain names like example.com into IP addresses. It acts like a phonebook of the internet. Without DNS, users would need to remember complex IP numbers.

Which network topology uses a central controller to manage communication?

In a star topology, each device connects to a central hub or switch, which controls data transmission. This makes troubleshooting easier but increases dependence on the hub. Failure of the hub can disrupt the entire network.

In C++, what is the default access specifier for class members?

In C++, class members are private by default unless explicitly specified. This promotes data encapsulation and hides implementation details. Structs, in contrast, have public members by default.

Which of the following file systems supports journaling?

NTFS (New Technology File System) includes journaling, which helps in recovering data after a system crash. It logs changes before actually writing them to disk. FAT-based systems do not support journaling.

banner ad

Which addressing mode is used in the instruction: MOV AL, [BX] in assembly language?

The instruction uses the content of register BX to point to a memory location, hence indirect addressing.

In database normalization, what does BCNF stand for?

BCNF is an advanced version of the third normal form and is designed to eliminate redundancy caused by functional dependencies. A table is in BCNF if it is in 3NF and every determinant is a candidate key. It ensures better data integrity.

In operating systems, which of the following is a non-preemptive scheduling algorithm?

Shortest Job First (SJF) in its non-preemptive form executes the shortest job next without interruption. Unlike Round Robin or Priority, it doesn't allow switching between tasks once started. This algorithm reduces average waiting time but may cause starvation.

Which of the following algorithms is used in public-key cryptography?

RSA (Rivest–Shamir–Adleman) is a widely used public-key cryptographic algorithm based on the difficulty of factoring large prime numbers. Unlike symmetric algorithms like AES or DES, RSA uses separate keys for encryption and decryption. It ensures secure data transmission in networks.

Which IP class is used for multicasting?

Class D IP: 224.0.0.0 to 239.255.255.255

What is the full form of DHCP?

It assigns IP addresses to devices on a network.

Which of the following storage types is volatile?

Data is lost when power is off.

banner ad
×
Subscribe now

for Latest Updates

Articles, Jobs, MCQ and many more!