Computer Science section is highly important and challenging in modern competitive exams like SSC CGL (Tier 2), RRB NTPC, Banking, and State Level IT Officer exams. Attempt these Top 100 Hard-Level MCQs covering advanced Networking, OS, Database, and Cryptography. After attempting, click on ‘Show Answer’ to see the detailed explanation.
Q. 1. Which of the following is a symmetric key cryptographic algorithm?
(a) RSA
(b) DSA
(c) AES
(d) Diffie-Hellman
Answer:-(c) AES
AES (Advanced Encryption Standard) is a symmetric key algorithm, meaning the same key is used for both encrypting and decrypting the data.
Q. 2. In OSI model, which layer is responsible for logical addressing and routing?
(a) Data Link Layer
(b) Network Layer
(c) Transport Layer
(d) Session Layer
Answer:-(b) Network Layer
The Network Layer is responsible for logical addressing (IP addresses) and routing packets across different networks.
Q. 3. What is the primary function of a TLB (Translation Lookaside Buffer)?
(a) To cache frequently used data
(b) To cache recently accessed instructions
(c) To cache recent virtual-to-physical address translations
(d) To manage disk I/O operations
Answer:-(c) To cache recent virtual-to-physical address translations
A TLB acts as a memory cache that stores recent translations of virtual memory to physical memory, speeding up memory access.
Q. 4. Which of the following sorting algorithms has the worst-case time complexity of O(n log n)?
(a) Quick Sort
(b) Merge Sort
(c) Bubble Sort
(d) Insertion Sort
Answer:-(b) Merge Sort
Merge Sort consistently divides the array in half and takes linear time to merge, guaranteeing an O(n log n) time complexity in all cases.
Q. 5. In relational databases, what does the ACID property ‘Isolation’ guarantee?
(a) Transactions are executed fully or not at all
(b) Data remains valid after transaction completion
(c) Concurrent transactions run as if they were executed sequentially
(d) Completed transactions are permanently saved
Answer:-(c) Concurrent transactions run as if they were executed sequentially
Isolation ensures that concurrent execution of transactions leaves the database in the same state that would have been obtained if the transactions were executed sequentially.
Q. 6. What is the purpose of the ‘BGP’ (Border Gateway Protocol)?
(a) To map IP addresses to MAC addresses
(b) To assign dynamic IP addresses
(c) To route data between autonomous systems on the internet
(d) To translate private IP addresses to public IPs
Answer:-(c) To route data between autonomous systems on the internet
BGP is the core routing protocol of the internet, designed to exchange routing and reachability information among autonomous systems (AS).
Q. 7. Which of the following scheduling algorithms can suffer from ‘Starvation’?
(a) Round Robin
(b) First-Come, First-Served (FCFS)
(c) Shortest Job Next (SJN)
(d) Multi-level Feedback Queue
Answer:-(c) Shortest Job Next (SJN)
In SJN, a continuous stream of short CPU bursts could cause a long process to wait indefinitely, resulting in starvation.
Q. 8. In cryptography, what is a ‘Salt’?
(a) A secret key used in symmetric encryption
(b) Random data added to a password before hashing
(c) A technique to compress secure data
(d) A type of digital signature algorithm
Answer:-(b) Random data added to a password before hashing
A salt is random data that is used as an additional input to a one-way function that hashes data, primary used to defend against dictionary attacks and pre-computed rainbow tables.
Q. 9. What is the main difference between TCP and UDP?
(a) TCP is connectionless, UDP is connection-oriented
(b) TCP provides reliable delivery, UDP does not
(c) TCP is faster than UDP
(d) UDP operates at the Network layer, TCP at the Transport layer
Answer:-(b) TCP provides reliable delivery, UDP does not
TCP establishes a connection and ensures reliable, ordered data delivery. UDP is connectionless and sends packets without guaranteeing delivery or order, making it faster but less reliable.
Q. 10. Which normal form (NF) in database normalization deals with multi-valued dependencies?
(a) 2NF
(b) 3NF
(c) BCNF
(d) 4NF
Answer:-(d) 4NF
Fourth Normal Form (4NF) aims to eliminate independent multi-valued dependencies, ensuring that a relation is in at least BCNF and contains no non-trivial multi-valued dependencies.
Q. 11. Advanced Web Tech Concept Q11: Which HTTP status code indicates ‘Forbidden’?
The Rajstudy Team is dedicated to helping aspirants prepare for Latest Government Jobs, including SSC, RPSC, UPSC, and State Exams. We provide high-quality MCQs on English Grammar, Science, Computer, General Hindi, and more, along with latest job notifications and recruitment updates. Our goal is to support students and job seekers with trusted, exam-focused content to boost their success in competitive exams.