GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 1421–1440 of 4601 questions
technology medium mcq

Which satellite is jointly developed by ISRO and NASA for Earth observation?

  1. CARTOSAT-3
  2. NISAR
  3. EOS-06
  4. RESOURCESAT-3
technology medium mcq

Which technology enables simultaneous voice and high-speed data on 4G networks?

  1. CSFB
  2. VoLTE
  3. SVLTE
  4. 2G Fallback
technology medium true_false

Unicode can represent characters from virtually all writing systems in the world.

  1. True
  2. False
technology medium mcq

Which protocol ensures data integrity and authenticity in digital communications?

  1. HTTP
  2. FTP
  3. Digital Signature
  4. SMTP
technology medium mcq

Which payment method uses biometric authentication linked to Aadhaar for transactions?

  1. UPI
  2. AePS
  3. NEFT
  4. IMPS
technology medium true_false

A proxy server can be used to bypass geographic content restrictions.

  1. True
  2. False
technology easy mcq

Which of the following is an example of system software?

  1. MS Word
  2. Google Chrome
  3. Windows OS
  4. VLC Player
technology hard mcq

Which ISRO mission demonstrated spacecraft docking technology in Earth orbit?

  1. SPADEX
  2. Gaganyaan-1
  3. Aditya-L2
  4. NISAR
technology medium mcq

Which SQL command is used to permanently save transaction changes in a database?

  1. SAVE
  2. COMMIT
  3. STORE
  4. FINALIZE
technology medium fill_blank

The technology that uses algorithms to make predictions or decisions without being explicitly programmed is called ________ Learning.

technology easy mcq

What does 'SIM' stand for in mobile phones?

  1. Single Identity Module
  2. Subscriber Identity Module
  3. Secure Information Memory
  4. System Integration Module
technology medium true_false

Virtual memory allows a computer to use hard disk space as an extension of RAM.

  1. True
  2. False
technology medium mcq

Which of the following is a social engineering attack?

  1. Buffer Overflow
  2. Phishing
  3. SQL Injection
  4. DDoS
technology medium mcq

Which protocol is used for secure remote login to network devices?

  1. Telnet
  2. FTP
  3. SSH
  4. HTTP
technology hard true_false

Quantum computers can break all existing encryption algorithms instantly.

  1. True
  2. False