100 Hard Level Computer MCQs for SSC CGL Tier 2 & RRB NTPC 2026

By rajstudy

Updated on:

100 Hard Computer MCQs for SSC CGL

Q. 76. Which of the following is a symmetric key cryptographic algorithm?

(a) RSA
(b) DSA
(c) AES
(d) Diffie-Hellman

 
Q. 77. In OSI model, which layer is responsible for logical addressing and routing?

(a) Data Link Layer
(b) Network Layer
(c) Transport Layer
(d) Session Layer

 
Q. 78. What is the primary function of a TLB (Translation Lookaside Buffer)?

(a) To cache frequently used data
(b) To cache recently accessed instructions
(c) To cache recent virtual-to-physical address translations
(d) To manage disk I/O operations

 
Q. 79. Which of the following sorting algorithms has the worst-case time complexity of O(n log n)?

(a) Quick Sort
(b) Merge Sort
(c) Bubble Sort
(d) Insertion Sort

 
Q. 80. In relational databases, what does the ACID property ‘Isolation’ guarantee?

(a) Transactions are executed fully or not at all
(b) Data remains valid after transaction completion
(c) Concurrent transactions run as if they were executed sequentially
(d) Completed transactions are permanently saved

 
Q. 81. What is the purpose of the ‘BGP’ (Border Gateway Protocol)?

(a) To map IP addresses to MAC addresses
(b) To assign dynamic IP addresses
(c) To route data between autonomous systems on the internet
(d) To translate private IP addresses to public IPs

Also Read This-  Conditional Sentences (Type 0/1/2/3) MCQ Quiz (100 Questions)
 
Q. 82. Which of the following scheduling algorithms can suffer from ‘Starvation’?

(a) Round Robin
(b) First-Come, First-Served (FCFS)
(c) Shortest Job Next (SJN)
(d) Multi-level Feedback Queue

 
Q. 83. In cryptography, what is a ‘Salt’?

(a) A secret key used in symmetric encryption
(b) Random data added to a password before hashing
(c) A technique to compress secure data
(d) A type of digital signature algorithm

 
Q. 84. What is the main difference between TCP and UDP?

(a) TCP is connectionless, UDP is connection-oriented
(b) TCP provides reliable delivery, UDP does not
(c) TCP is faster than UDP
(d) UDP operates at the Network layer, TCP at the Transport layer

 
Q. 85. Which normal form (NF) in database normalization deals with multi-valued dependencies?

(a) 2NF
(b) 3NF
(c) BCNF
(d) 4NF

 
Q. 86. Advanced Compilers Concept Q86: Which phase of a compiler deals with parsing?

(a) Semantic Analysis
(b) Syntax Analysis
(c) Lexical Analysis
(d) Code Generation

 
 
Q. 88. Advanced Operating Systems Concept Q88: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) LFU
(b) Optimal
(c) FIFO
(d) LRU

 
Q. 89. Advanced Databases Concept Q89: What is the highest isolation level in SQL standards?

(a) Read Committed
(b) Repeatable Read
(c) Read Uncommitted
(d) Serializable

 
Q. 90. Advanced Software Eng Concept Q90: In SDLC, which model emphasizes risk analysis?

(a) Agile
(b) Waterfall
(c) V-Model
(d) Spiral

 
Q. 91. Advanced Networking Concept Q91: What is the size of an IPv6 address?

(a) 32 bits
(b) 128 bits
(c) 256 bits
(d) 64 bits

 
Q. 92. Advanced Compilers Concept Q92: Which phase of a compiler deals with parsing?

(a) Semantic Analysis
(b) Lexical Analysis
(c) Syntax Analysis
(d) Code Generation

 
Q. 93. Advanced Software Eng Concept Q93: In SDLC, which model emphasizes risk analysis?

(a) Agile
(b) V-Model
(c) Spiral
(d) Waterfall

 
 
Q. 95. Advanced Security Concept Q95: Which attack involves sending forged ARP messages to a LAN?

(a) ARP Spoofing
(b) IP Spoofing
(c) DNS Poisoning
(d) MAC Spoofing

 
Q. 96. Advanced Algorithms Concept Q96: Dijkstra’s Algorithm is used to solve which problem?

(a) Minimum Spanning Tree
(b) Bipartite Matching
(c) Maximum Flow
(d) Single-Source Shortest Path

 
Q. 97. Advanced Databases Concept Q97: What is the highest isolation level in SQL standards?

(a) Repeatable Read
(b) Read Committed
(c) Serializable
(d) Read Uncommitted

 
Q. 98. Advanced Operating Systems Concept Q98: Which page replacement algorithm suffers from Belady’s Anomaly?

(a) FIFO
(b) Optimal
(c) LFU
(d) LRU

 
Q. 99. Advanced Architecture Concept Q99: Which architectural feature introduces overlapping execution of multiple instructions?

(a) Virtual Memory
(b) Pipelining
(c) Multithreading
(d) Caching

 
Q. 100. Advanced Security Concept Q100: Which attack involves sending forged ARP messages to a LAN?

(a) DNS Poisoning
(b) MAC Spoofing
(c) IP Spoofing
(d) ARP Spoofing

 

Your Quiz Summary

« Prev1234

Leave a Comment