Set No -15: COMPUTER GENERAL KNOWLEDGE QUIZ

Q1. A system with multiple processors sharing the same memory is called:

A. Distributed System
B. Multiprocessing System
C. Multitasking System
D. Time-Sharing System

Answer: B. Multiprocessing System


Q2. If a process is waiting for I/O operation, it is in which state?

A. Ready
B. Running
C. Waiting (Blocked)
D. Terminated

Answer: C. Waiting (Blocked)


Q3. Which encryption technique uses the same key for encryption and decryption?

A. RSA
B. AES
C. Asymmetric Encryption
D. Digital Signature

Answer: B. AES
(AES is a symmetric key encryption algorithm.)


Q4. In SQL, which constraint ensures that a column cannot have NULL values?

A. UNIQUE
B. NOT NULL
C. CHECK
D. DEFAULT

Answer: B. NOT NULL


Q5. Which IPv6 address type is equivalent to IPv4 broadcast?

A. Unicast
B. Multicast
C. Anycast
D. Loopback

Answer: B. Multicast
(IPv6 does not use broadcast; multicast replaces it.)


Q6. What happens in Deadlock?

A. Process runs continuously
B. Process waits for CPU
C. Two or more processes wait indefinitely for each other
D. System shuts down

Answer: C. Two or more processes wait indefinitely for each other


Q7. Which normalization form removes partial dependency?

A. 1NF
B. 2NF
C. 3NF
D. BCNF

Answer: B. 2NF


Q8. Which protocol works at Transport Layer?

A. IP
B. ARP
C. TCP
D. Ethernet

Answer: C. TCP


Q9. Which command in Linux is used to change file permissions?

A. chmod
B. chown
C. ls
D. mkdir

Answer: A. chmod


Q10. Which data structure is used in recursion internally?

A. Queue
B. Stack
C. Array
D. Linked List

Answer: B. Stack


Q11. In DBMS, which key uniquely identifies a record?

A. Foreign Key
B. Composite Key
C. Primary Key
D. Candidate Key

Answer: C. Primary Key


Q12. What is the purpose of Load Balancer?

A. Store data
B. Encrypt files
C. Distribute traffic across servers
D. Increase RAM

Answer: C. Distribute traffic across servers


Q13. Which layer of TCP/IP model handles routing?

A. Application Layer
B. Transport Layer
C. Internet Layer
D. Network Access Layer

Answer: C. Internet Layer


Q14. Which algorithm is used in public key encryption?

A. DES
B. AES
C. RSA
D. MD5

Answer: C. RSA


Q15. In C++, which concept allows same function name with different parameters?

A. Overriding
B. Overloading
C. Inheritance
D. Encapsulation

Answer: B. Overloading


Q16. Which storage is best for large-scale distributed data?

A. SSD
B. HDD
C. Cloud Storage
D. Cache

Answer: C. Cloud Storage


Q17. What is the main purpose of Virtual Memory?

A. Increase CPU speed
B. Increase RAM physically
C. Use disk space as RAM extension
D. Encrypt memory

Answer: C. Use disk space as RAM extension


Q18. Which attack manipulates DNS records?

A. Phishing
B. DNS Spoofing
C. Brute Force
D. Trojan

Answer: B. DNS Spoofing


Q19. Which SQL join returns only matching records?

A. LEFT JOIN
B. RIGHT JOIN
C. FULL JOIN
D. INNER JOIN

Answer: D. INNER JOIN


Q20. Which hashing algorithm is commonly used in digital signatures?

A. SHA
B. FTP
C. SMTP
D. HTTP

Answer: A. SHA

Leave a Reply

Your email address will not be published. Required fields are marked *