Computer Gk For All Competitive Exams Series #86

Computer Gk For All Competitive Exams Series #86

Hello readers,

If you are doing preparation for SSC, BANKS, LIC,HSSC Exams, come to us regularly. COMPUTER Gk  for SSC, BANKS, LIC,HSSC Exams like SSC CGL, SSC CHSL, BANK PO, BANK CLERK, LIC AO, haryana police, gram sachiv, clerk, canal patwari, HPSC etc. ।Computer General Knowledge  Computer General Knowledge Questions । haryana general knowledge and current affairs ।. । haryana Samanyagyan ।

Computer Gk For All Competitive Exams Series #86

Q1701. NAT stands for:
a) Network Address Translator√
b) Network Access Translator
c) Network Acquired Translator
d) None of These
Q1702. Cryptography is derived from the ____word:
a) Greek√
b) French
c) Latin
d) None of These
Q1703. Cryptography is the study of information______:
a) Hiding
b) Verification
c) Both of Above√
d) None of These
Q1704. Cryptography includes the __________to securely and consistently prevent
or delay unauthorized access to sensitive information and enable verifiability of
every component in a communication:
a) Protocols
b) Algorithms
c) Strategies
d) All of the Above√
e) None of These
Q1705. Cryptography and Cryptanalysis are sometimes grouped together under the
____term cryptology, encompassing the entire subject. In practice,
“cryptography” is also often used to refer to the field as a whole, especially as an
applied science:
a) Umbrella√
b) Shield
c) Veil
d) None of These
Q1706. Cryptography is an interdisciplinary subject, drawing from several fields.
Before the time of computers, it was closely related to linguistic. Nowadays the
emphasis has shifted, and cryptography makes extensive use of technical ares of
mathematics, especially those areas collectively known as _______mathematics:
a) Increte
b) Discrete√
c) Both of Above
d) None of These
Q1707. An example of the sub – fields of cryptography is:
a) Steganography
b) Traffic Analysis
c) Both of Above√
d) None of These
Q1708. Which among the following is correct:
a) Traffic Analysis is the analysis of patterns of communication in order to learn secret
b) Steganography is the study of hiding the very existence of a message, and not necessarily the
contents of the message itself like microdots or invisible ink.
c) Both of Above√
d) None of These
Q1709- When information is transformed from a useful form of understanding to an
opaque form of understanding, this is called:
a) Encryption√
b) Decryption
c) Both of Above d) None of These
Q1710. When the information is reverted back into a useful form it is called:
a) Standard encryption
b) Plain text encryption
c) Decryption√
d) None of These
Q1711. Symmetric – key cryptography refers to ______methods in which both the
sender and receiver share the same key ( or , less commonly, in which their keys
are different but related in an easily computable way):
a) Encryption√
b) Decryption
c) Both of above
d) None of These
Q1712. Symmetric key cryptography was the only kind of encryption publicly known
a) July 195
b) June, 1976√
c) June 1988
d) None of These
Q1713. Which among the following is correct about goals in cryptography:
a) Confidentiality – Only an authorized recipient should be able to extract the contents of the
message from its encrypted form. Resulting from steps to hide, stop or delay free access to the
encrypted information.
b) Message Integrity – The recipient should be able to determine if the message has been altered.
c) Sender Authentication – The recipient should be able to verify from the message, the identity
of the sender, the origin or the path it traveled (or combinations) so to validate claims from
emitter or to validated the recipient expectations.
d) Sender Non repudiation – The emitter should not be able to deny sending the message
e) None of These
f) All of the Above√
Q1714. License is still required to use cryptography in which among the following
a) Iran and China√
b) China and India
c) India and Pakistan
d) None of These
Q1715. NSA stands for:
a) National Security Agency√
b) Norway Security Agency
c) National Security Assessment
d) None of These
Q1716. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK
police the powers to force suspects to _____that protect encryption keys:
a) Hand over passwords
b) Decrypt Files
c) Both of Above√
d) None of These
Artificial Intelligence
Q1717. Which among the following is correct about the ‘Artificial Intelligence’:
a) It is the science and engineering of making intelligent machines, especially intelligent
computer programs.
b) Artificial Intelligence is the intelligence exhibited by machines or software.
c) Artificial Intelligence is the branch of computer science concerned with making computers
behave like humans.
d) All of the Above√
e) None of These
Q1718. The term ‘Artificial Intelligence’ was first coined in ______:
a) 1960
b) 1950
c) 1955√
d) None of These
Q1719. The term Artificial Intelligence was coined in 1955 by_____:
a) James Gosling
b) John Mc Carthy√
c) Charles Babbage
d) None of These
Q1720. Which among the following includes the areas of Artificial Intelligence
a) Games (Programming computers to play games against human opponents)
b) Natural Languages (Programming computers to understand natural human languages)
c) Neutral Networks (Systems that simulate intelligence by attempting to reproduce the types of
physical connections that occur in animal brains)
d) All of the Above√
e) None of These

Thank you for reading the Computer gk questions answers for SSC, BANK, HSSC exams On 



Leave a Comment