100 Hard Level Computer MCQs for SSC CGL Tier 2 & RRB NTPC 2026

By rajstudy

Updated on:

100 Hard Computer MCQs for SSC CGL

Q. 51. Which of the following is a symmetric key cryptographic algorithm?

(a) RSA
(b) DSA
(c) AES
(d) Diffie-Hellman

 
Q. 52. In OSI model, which layer is responsible for logical addressing and routing?

(a) Data Link Layer
(b) Network Layer
(c) Transport Layer
(d) Session Layer

 
Q. 53. What is the primary function of a TLB (Translation Lookaside Buffer)?

(a) To cache frequently used data
(b) To cache recently accessed instructions
(c) To cache recent virtual-to-physical address translations
(d) To manage disk I/O operations

 
Q. 54. Which of the following sorting algorithms has the worst-case time complexity of O(n log n)?

(a) Quick Sort
(b) Merge Sort
(c) Bubble Sort
(d) Insertion Sort

 
Q. 55. In relational databases, what does the ACID property ‘Isolation’ guarantee?

(a) Transactions are executed fully or not at all
(b) Data remains valid after transaction completion
(c) Concurrent transactions run as if they were executed sequentially
(d) Completed transactions are permanently saved

 
Q. 56. What is the purpose of the ‘BGP’ (Border Gateway Protocol)?

(a) To map IP addresses to MAC addresses
(b) To assign dynamic IP addresses
(c) To route data between autonomous systems on the internet
(d) To translate private IP addresses to public IPs

Also Read This-  Error Detection Mixed Grand Test (Set-2) (150 Questions)
 
Q. 57. Which of the following scheduling algorithms can suffer from ‘Starvation’?

(a) Round Robin
(b) First-Come, First-Served (FCFS)
(c) Shortest Job Next (SJN)
(d) Multi-level Feedback Queue

 
Q. 58. In cryptography, what is a ‘Salt’?

(a) A secret key used in symmetric encryption
(b) Random data added to a password before hashing
(c) A technique to compress secure data
(d) A type of digital signature algorithm

 
Q. 59. What is the main difference between TCP and UDP?

(a) TCP is connectionless, UDP is connection-oriented
(b) TCP provides reliable delivery, UDP does not
(c) TCP is faster than UDP
(d) UDP operates at the Network layer, TCP at the Transport layer

 
Q. 60. Which normal form (NF) in database normalization deals with multi-valued dependencies?

(a) 2NF
(b) 3NF
(c) BCNF
(d) 4NF

 
Q. 61. Advanced Operating Systems Concept Q61: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) FIFO
(b) LRU
(c) LFU
(d) Optimal

 
 
Q. 63. Advanced Databases Concept Q63: What is the highest isolation level in SQL standards?

(a) Repeatable Read
(b) Read Uncommitted
(c) Read Committed
(d) Serializable

 
Q. 64. Advanced Security Concept Q64: Which attack involves sending forged ARP messages to a LAN?

(a) MAC Spoofing
(b) DNS Poisoning
(c) ARP Spoofing
(d) IP Spoofing

 
Q. 65. Advanced Operating Systems Concept Q65: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) FIFO
(b) Optimal
(c) LFU
(d) LRU

 
Q. 66. Advanced Databases Concept Q66: What is the highest isolation level in SQL standards?

(a) Serializable
(b) Read Committed
(c) Repeatable Read
(d) Read Uncommitted

 
Q. 67. Advanced Software Eng Concept Q67: In SDLC, which model emphasizes risk analysis?

(a) Waterfall
(b) Spiral
(c) V-Model
(d) Agile

 
Q. 68. Advanced Architecture Concept Q68: Which architectural feature introduces overlapping execution of multiple instructions?

(a) Virtual Memory
(b) Pipelining
(c) Multithreading
(d) Caching

 
 
Q. 70. Advanced Operating Systems Concept Q70: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) Optimal
(b) LRU
(c) FIFO
(d) LFU

 
Q. 71. Advanced Web Tech Concept Q71: Which HTTP status code indicates ‘Forbidden’?

(a) 403
(b) 404
(c) 401
(d) 400

 
Q. 72. Advanced Compilers Concept Q72: Which phase of a compiler deals with parsing?

(a) Lexical Analysis
(b) Semantic Analysis
(c) Code Generation
(d) Syntax Analysis

 
Q. 73. Advanced Networking Concept Q73: What is the size of an IPv6 address?

(a) 32 bits
(b) 64 bits
(c) 256 bits
(d) 128 bits

 
Q. 74. Advanced Operating Systems Concept Q74: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) LRU
(b) FIFO
(c) LFU
(d) Optimal

 
Q. 75. Advanced Software Eng Concept Q75: In SDLC, which model emphasizes risk analysis?

(a) Agile
(b) Waterfall
(c) Spiral
(d) V-Model

 

« Prev1234Next »

Leave a Comment