GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 581–600 of 1561 questions
technology medium mcq

Which NPCI initiative enables interoperable QR code payments across all UPI apps?

  1. Bharat QR
  2. UPI QR
  3. Both A and B
  4. None
technology medium mcq

Which attack floods a network with ICMP echo requests to consume bandwidth?

  1. Smurf Attack
  2. Ping Flood
  3. SYN Flood
  4. All of these
technology hard mcq

Which technology uses distributed sensors to monitor structural health of bridges and buildings?

  1. IoT
  2. Blockchain
  3. VR
  4. 3D Printing
technology easy true_false

The Ayushman Bharat Digital Mission creates unique health IDs for citizens.

  1. True
  2. False
technology medium mcq

Which frequency band offers better building penetration for mobile signals?

  1. 26 GHz
  2. 3.5 GHz
  3. 700 MHz
  4. 1800 MHz
technology hard fill_blank

A security model that defines how subjects access objects in a system is called ________ Model.

technology medium mcq

Which device operates at Layer 2 of the OSI model and uses MAC addresses?

  1. Router
  2. Switch
  3. Hub
  4. Gateway
technology medium true_false

UPI transactions can be reversed by the sender after successful completion.

  1. True
  2. False
technology easy mcq

Which port is commonly used for connecting a keyboard to a computer?

  1. HDMI
  2. USB
  3. VGA
  4. Ethernet
technology medium mcq

Which SQL aggregate function returns the number of rows matching a condition?

  1. SUM
  2. AVG
  3. COUNT
  4. MAX
technology medium mcq

Which authentication method uses physical characteristics like fingerprint or face?

  1. Knowledge-based
  2. Possession-based
  3. Inherence-based
  4. Location-based
technology medium mcq

Which technology enables voice calls over internet protocol networks?

  1. SMS
  2. MMS
  3. VoIP
  4. GPRS
technology hard mcq

Which AI technique is used for detecting anomalies in network traffic for cybersecurity?

  1. Supervised Learning
  2. Unsupervised Learning
  3. Reinforcement Learning
  4. All of these