Set No -25: COMPUTER GENERAL KNOWLEDGE QUIZ

Q1. Which memory management technique allows non-contiguous memory allocation?

A. Segmentation
B. Paging
C. Swapping
D. Partitioning

Answer: B. Paging


Q2. What is the total number of IP addresses in a /29 subnet?

A. 4
B. 6
C. 8
D. 16

Answer: C. 8
(/29 → 2³ = 8 total addresses)


Q3. Which ACID property ensures that a transaction moves the database from one valid state to another?

A. Atomicity
B. Consistency
C. Isolation
D. Durability

Answer: B. Consistency


Q4. Which scheduling algorithm is also known as Shortest Remaining Time First (SRTF)?

A. Preemptive SJF
B. FCFS
C. Round Robin
D. Priority Scheduling

Answer: A. Preemptive SJF


Q5. Which protocol is used to securely transfer emails?

A. SMTP
B. POP3
C. IMAPS
D. FTP

Answer: C. IMAPS


Q6. Which Linux command is used to change file ownership?

A. chmod
B. chown
C. chgrp
D. mv

Answer: B. chown


Q7. Which RAID level provides double parity?

A. RAID 1
B. RAID 5
C. RAID 6
D. RAID 10

Answer: C. RAID 6


Q8. Which encryption technique uses two different keys?

A. Symmetric Encryption
B. Hashing
C. Asymmetric Encryption
D. Block Cipher

Answer: C. Asymmetric Encryption


Q9. Which OSI layer is responsible for framing?

A. Physical Layer
B. Data Link Layer
C. Network Layer
D. Transport Layer

Answer: B. Data Link Layer


Q10. Which command in SQL is used to revoke user permissions?

A. REMOVE
B. DELETE
C. REVOKE
D. DENY

Answer: C. REVOKE


Q11. Which type of attack involves injecting malicious SQL queries?

A. Phishing
B. SQL Injection
C. DoS
D. Brute Force

Answer: B. SQL Injection


Q12. What is the default port number for FTP?

A. 21
B. 22
C. 23
D. 25

Answer: A. 21


Q13. Which cloud model is shared by several organizations with common concerns?

A. Public Cloud
B. Private Cloud
C. Hybrid Cloud
D. Community Cloud

Answer: D. Community Cloud


Q14. Which memory is used to temporarily store instructions for quick access?

A. Cache
B. ROM
C. Hard Disk
D. DVD

Answer: A. Cache


Q15. Which TCP flag is used to terminate a connection?

A. SYN
B. ACK
C. FIN
D. PSH

Answer: C. FIN


Q16. Which sorting algorithm does not use comparison?

A. Merge Sort
B. Quick Sort
C. Counting Sort
D. Heap Sort

Answer: C. Counting Sort


Q17. Which file system is commonly used in Linux?

A. NTFS
B. FAT32
C. ext4
D. HFS+

Answer: C. ext4


Q18. Which technique allows a process to access more memory than physically available?

A. Paging
B. Virtual Memory
C. Swapping
D. Segmentation

Answer: B. Virtual Memory


Q19. Which protocol is used to send email from client to server?

A. SMTP
B. POP3
C. IMAP
D. SNMP

Answer: A. SMTP


Q20. Which hashing algorithm produces a 512-bit output?

A. MD5
B. SHA-1
C. SHA-256
D. SHA-512

Answer: D. SHA-512

Leave a Reply

Your email address will not be published. Required fields are marked *