GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 1001–1020 of 1857 questions
technology easy mcq

Which key combination is commonly used to copy selected text in Windows?

  1. Ctrl+V
  2. Ctrl+X
  3. Ctrl+C
  4. Ctrl+Z
technology easy mcq

What is the name of ISRO's reusable launch vehicle technology demonstrator?

  1. RLV-TD
  2. GSLV-F12
  3. PSLV-C56
  4. SSLV-D3
technology medium mcq

Which technology uses distributed ledger to record transactions across multiple computers?

  1. Cloud Computing
  2. Blockchain
  3. Edge Computing
  4. Quantum Computing
technology medium mcq

Which frequency band is primarily used for 4G LTE services in India?

  1. 700 MHz
  2. 1800 MHz
  3. 26 GHz
  4. 60 GHz
technology easy mcq

What does 'URL' stand for in web addressing?

  1. Universal Resource Locator
  2. Uniform Resource Locator
  3. United Resource Link
  4. Universal Reference Link
technology medium mcq

Which of the following is a strong password practice?

  1. Using birthdate as password
  2. Reusing passwords across sites
  3. Using 12+ characters with mix of types
  4. Writing password on sticky note
technology medium mcq

Which payment system in India enables instant money transfer using mobile number and MMID?

  1. NEFT
  2. RTGS
  3. IMPS
  4. ECS
technology medium mcq

Which authentication factor is represented by 'something you are'?

  1. Password
  2. Smart Card
  3. Fingerprint
  4. Security Token
technology medium mcq

Which file extension is typically associated with executable files in Windows?

  1. .txt
  2. .exe
  3. .pdf
  4. .jpg
technology medium mcq

Which satellite series is used for Earth observation and remote sensing in India?

  1. INSAT
  2. GSAT
  3. CARTOSAT
  4. IRNSS
technology hard mcq

Which AI technique is used for generating realistic images, videos, or text by learning data patterns?

  1. Decision Trees
  2. Generative Adversarial Networks
  3. Linear Regression
  4. K-Means Clustering
technology medium mcq

Which SQL clause is used to filter groups after aggregation?

  1. WHERE
  2. HAVING
  3. GROUP BY
  4. ORDER BY
technology hard mcq

Which encryption method uses a pair of keys (public and private) for secure communication?

  1. Symmetric Encryption
  2. Asymmetric Encryption
  3. Hashing
  4. Steganography