HSSC TGT Computer Questions & Answers: Looking for a way to improve your Computer Knowledge for HSSC TGT Exam? then you can attempt this HSSC TGT Computer Quiz to check out the questions for the computer section. These Computer GK Questions Answers for HSSC will help aspirants to create awareness with regard to computers and also help in getting good scores.
HSSC TGT Computer Questions & Answers
In the below sections you can find the HSSC TGT Computer Questions related to Awareness of computer-based technology and terminology, common terms used in internet usage, and other things related to computers can be found here. Hence, candidates who are preparing for the exam should take a chance and attempt this quiz right away to test their computer knowledge.
1. Which of the following is not an input device?
A) Keyboard
B) Mouse
C) Monitor
D) Scanner
Answer: C) Monitor
Explanation: A monitor is an output device, not an input device.
2. What is the full form of BIOS?
A) Basic Input Output System
B) Basic Input Output Software
C) Binary Input Output System
D) Binary Input Output Software
Answer: A) Basic Input Output System
Explanation: BIOS stands for Basic Input Output System, which is firmware used to perform hardware initialization during the booting process.
3. Which of the following is an example of a non-volatile memory?
A) RAM
B) ROM
C) Cache
D) Virtual Memory
Answer: B) ROM
Explanation: ROM (Read-Only Memory) is a non-volatile memory that stores permanent data and instructions.
4. What is the purpose of a firewall?
A) To prevent unauthorized access to a network
B) To encrypt data transmitted over a network
C) To speed up data transmission over a network
D) To filter spam emails
Answer: A) To prevent unauthorized access to a network
Explanation: A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
5. What is the difference between a virus and a worm?
A) Viruses can spread over a network, while worms cannot
B) Viruses require a host program to run, while worms are standalone programs
C) Viruses can infect both files and networks, while worms can only infect files
D) There is no difference between a virus and a worm
Answer: B) Viruses require a host program to run, while worms are standalone programs
Explanation: Viruses require a host program to replicate, while worms can replicate on their own without a host program.
6. Which of the following is not a type of cloud service?
A) Infrastructure as a Service (IaaS)
B) Platform as a Service (PaaS)
C) Software as a Service (SaaS)
D) Storage as a Service (STaaS)
Answer: D) Storage as a Service (STaaS)
Explanation: Storage as a Service is not a recognized type of cloud service.
7. What is a SQL injection attack?
A) An attack where a hacker gains unauthorized access to a network
B) An attack where a hacker uses social engineering to obtain sensitive information
C) An attack where a hacker inserts malicious SQL code into a database query
D) An attack where a hacker steals login credentials by intercepting network traffic
Answer: C) An attack where a hacker inserts malicious SQL code into a database query
Explanation: A SQL injection attack is a type of injection attack where an attacker inserts malicious SQL code into a database query.
8. Which of the following is not a type of malware?
A) Virus
B) Spyware
C) Adware
D) Firewall
Answer: D) Firewall
Explanation: A firewall is a security system and not a type of malware.
9. What is a cookie?
A) A type of malware
B) A small text file stored on a user’s computer by a website
C) A type of web browser
D) A form of social engineering
Answer: B) A small text file stored on a user’s computer by a website
Explanation: A cookie is a small text file that a website stores on a user’s computer to remember their preferences and login information.
10. Which of the following is not an example of a programming language?
A) Java
B) HTML
C) Python
D) MySQL
Answer: D) MySQL
Explanation: MySQL is a database management system, not a programming language.
11. What is the purpose of a compiler?
A) To convert high-level programming language into machine language
B) To execute a program
C) To debug a program
D) To store data in a database
Answer: A) To convert high-level programming language into machine language
Explanation: A compiler is a software tool that translates high-level programming language into machine language that can be executed by a computer.
12. What is the purpose of a loop in programming?
A) To execute a statement or group of statements repeatedly
B) To execute a statement only once
C) To execute a statement conditionally
D) To execute a statement based on user input
Answer: A) To execute a statement or group of statements repeatedly
Explanation: A loop is a programming construct that allows a statement or group of statements to be executed repeatedly.
13. Which of the following is not a data structure?
A) Stack
B) Queue
C) Array
D) Operating System
Answer: D) Operating System
Explanation: An operating system is a software program that manages computer hardware and software resources, and it is not a data structure.
14. What is the purpose of an operating system?
A) To manage computer hardware and software resources
B) To manage database systems
C) To manage web servers
D) To manage network devices
Answer: A) To manage computer hardware and software resources
Explanation: An operating system is a software program that manages computer hardware and software resources, including memory, input/output devices, and application software.
15. Which of the following is not a type of computer network?
A) Local Area Network (LAN)
B) Wide Area Network (WAN)
C) Metropolitan Area Network (MAN)
D) Graphic Area Network (GAN)
Answer: D) Graphic Area Network (GAN)
Explanation: A Graphic Area Network is not a recognized type of computer network.
16. What is a VPN?
A) A virtual private network that allows users to access a private network over a public network
B) A virus protection program
C) A type of computer network
D) A programming language
Answer: A) A virtual private network that allows users to access a private network over a public network
Explanation: A VPN (Virtual Private Network) is a secure network connection that allows users to access a private network over a public network, such as the Internet.
17. What is a URL?
A) An internet protocol
B) A type of computer virus
C) A web address
D) A type of programming language
Answer: C) A web address
Explanation: A URL (Uniform Resource Locator) is a web address used to locate and retrieve information on the Internet.
18. What is cloud computing?
A) A type of programming language
B) A network security system
C) A model for delivering computing services over the Internet
D) A type of computer virus
Answer: C) A model for delivering computing services over the Internet
Explanation: Cloud computing is a model for delivering computing services over the Internet, including storage, processing power, and software applications.
19. Which of the following is not a type of computer storage?
A) Hard Disk Drive (HDD)
B) Solid State Drive (SSD)
C) Random Access Memory (RAM)
D) Central Processing Unit (CPU)
Answer: D) Central Processing Unit (CPU)
Explanation: A CPU is not a type of computer storage, but rather the main processing unit of a computer.
20. What is an algorithm?
A) A type of computer virus
B) A set of instructions for solving a problem or completing a task
C) A type of computer network
D) A programming language
Answer: B) A set of instructions for solving a problem or completing a task
Explanation: An algorithm is a set of instructions or a step-by-step procedure for solving a problem or completing a task, often used in computer programming and mathematics.