100 Hard Level Computer MCQs for SSC CGL Tier 2 & RRB NTPC 2026

By rajstudy

Updated on:

100 Hard Computer MCQs for SSC CGL

Q. 26. Which of the following is a symmetric key cryptographic algorithm?

(a) RSA
(b) DSA
(c) AES
(d) Diffie-Hellman

 
Q. 27. In OSI model, which layer is responsible for logical addressing and routing?

(a) Data Link Layer
(b) Network Layer
(c) Transport Layer
(d) Session Layer

 
Q. 28. What is the primary function of a TLB (Translation Lookaside Buffer)?

(a) To cache frequently used data
(b) To cache recently accessed instructions
(c) To cache recent virtual-to-physical address translations
(d) To manage disk I/O operations

 
Q. 29. Which of the following sorting algorithms has the worst-case time complexity of O(n log n)?

(a) Quick Sort
(b) Merge Sort
(c) Bubble Sort
(d) Insertion Sort

 
Q. 30. In relational databases, what does the ACID property ‘Isolation’ guarantee?

(a) Transactions are executed fully or not at all
(b) Data remains valid after transaction completion
(c) Concurrent transactions run as if they were executed sequentially
(d) Completed transactions are permanently saved

 
Q. 31. What is the purpose of the ‘BGP’ (Border Gateway Protocol)?

(a) To map IP addresses to MAC addresses
(b) To assign dynamic IP addresses
(c) To route data between autonomous systems on the internet
(d) To translate private IP addresses to public IPs

Also Read This-  Prefix and Suffix MCQs
 
Q. 32. Which of the following scheduling algorithms can suffer from ‘Starvation’?

(a) Round Robin
(b) First-Come, First-Served (FCFS)
(c) Shortest Job Next (SJN)
(d) Multi-level Feedback Queue

 
Q. 33. In cryptography, what is a ‘Salt’?

(a) A secret key used in symmetric encryption
(b) Random data added to a password before hashing
(c) A technique to compress secure data
(d) A type of digital signature algorithm

 
Q. 34. What is the main difference between TCP and UDP?

(a) TCP is connectionless, UDP is connection-oriented
(b) TCP provides reliable delivery, UDP does not
(c) TCP is faster than UDP
(d) UDP operates at the Network layer, TCP at the Transport layer

 
Q. 35. Which normal form (NF) in database normalization deals with multi-valued dependencies?

(a) 2NF
(b) 3NF
(c) BCNF
(d) 4NF

 
Q. 36. Advanced Web Tech Concept Q36: Which HTTP status code indicates ‘Forbidden’?

(a) 400
(b) 403
(c) 404
(d) 401

 
 
Q. 38. Advanced Security Concept Q38: Which attack involves sending forged ARP messages to a LAN?

(a) IP Spoofing
(b) MAC Spoofing
(c) DNS Poisoning
(d) ARP Spoofing

 
Q. 39. Advanced Operating Systems Concept Q39: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) Optimal
(b) LFU
(c) FIFO
(d) LRU

 
Q. 40. Advanced Compilers Concept Q40: Which phase of a compiler deals with parsing?

(a) Code Generation
(b) Lexical Analysis
(c) Syntax Analysis
(d) Semantic Analysis

 
Q. 41. Advanced Software Eng Concept Q41: In SDLC, which model emphasizes risk analysis?

(a) V-Model
(b) Waterfall
(c) Spiral
(d) Agile

 
Q. 42. Advanced Databases Concept Q42: What is the highest isolation level in SQL standards?

(a) Serializable
(b) Read Uncommitted
(c) Read Committed
(d) Repeatable Read

 
Q. 43. Advanced Databases Concept Q43: What is the highest isolation level in SQL standards?

(a) Read Committed
(b) Read Uncommitted
(c) Repeatable Read
(d) Serializable

 
 
Q. 45. Advanced Networking Concept Q45: What is the size of an IPv6 address?

(a) 256 bits
(b) 32 bits
(c) 128 bits
(d) 64 bits

 
Q. 46. Advanced Compilers Concept Q46: Which phase of a compiler deals with parsing?

(a) Syntax Analysis
(b) Code Generation
(c) Semantic Analysis
(d) Lexical Analysis

 
Q. 47. Advanced Data Structures Concept Q47: What is the worst-case time complexity of searching in a Binary Search Tree (BST)?

(a) O(log n)
(b) O(n log n)
(c) O(n)
(d) O(1)

 
Q. 48. Advanced Networking Concept Q48: What is the size of an IPv6 address?

(a) 256 bits
(b) 128 bits
(c) 32 bits
(d) 64 bits

 
Q. 49. Advanced Architecture Concept Q49: Which architectural feature introduces overlapping execution of multiple instructions?

(a) Multithreading
(b) Caching
(c) Pipelining
(d) Virtual Memory

 
Q. 50. Advanced Operating Systems Concept Q50: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) LFU
(b) Optimal
(c) LRU
(d) FIFO

 

« Prev1234Next »

Leave a Comment