All Exams  >   SSC CGL  >   SSC CGL Previous Year Papers  >   All Questions

All questions of Computers for SSC CGL Exam

Which of the following is not an operating system? (SSC CGL 1st Sit. 2016)
  • a)
    Android
  • b)
    Vista
  • c)
    iOS
  • d)
    Opera
Correct answer is option 'D'. Can you explain this answer?

Arnav Saini answered
Understanding Operating Systems
An operating system (OS) is crucial software that manages computer hardware and software resources, providing common services for computer programs. Let's analyze the given options to identify which one is not an operating system.
Options Overview
- Android:
- A mobile operating system developed by Google.
- Primarily used in smartphones and tablets.
- Vista:
- Windows Vista is an OS developed by Microsoft.
- Released as part of the Windows NT family.
- iOS:
- An OS created by Apple for its mobile devices.
- Powers iPhones, iPads, and iPod Touch.
- Opera:
- A web browser developed by Opera Software.
- Primarily used for accessing the internet, not an operating system.
Conclusion
The correct answer is option D (Opera) because:
- Opera is not an operating system; it is a web browser that allows users to navigate the internet.
- In contrast, Android, Vista, and iOS are all operating systems designed to manage hardware and software on devices.
Key Takeaway
When identifying operating systems, remember they are responsible for managing computer resources, whereas applications like web browsers serve specific functions within those systems.

An alternate name for the completely interconnected network topology is      (SSC CGL 2nd Sit. 2012)
  • a)
    Mesh
  • b)
    Star
  • c)
    Tree
  • d)
    Ring
Correct answer is option 'A'. Can you explain this answer?

Malavika Rane answered
Understanding Network Topologies
Network topology refers to the arrangement of different elements (links, nodes, etc.) in a computer network. The arrangement plays a significant role in determining how data is transmitted and how efficiently the network operates.
Completely Interconnected Network Topology
A completely interconnected network topology allows every node (device) to connect directly to every other node. This design ensures high reliability and redundancy, as there are multiple paths for data transmission.
Mesh Topology
- Definition: The term "mesh" signifies that every device in the network is interconnected with all other devices.
- Types: Mesh topology can be classified into two types:
- Full Mesh: Every device has a direct connection to every other device.
- Partial Mesh: Some devices are interconnected, while others may connect through one or more intermediary devices.
- Advantages:
- High redundancy: If one link fails, data can still be transmitted through alternate paths.
- Enhanced reliability: The failure of one node does not significantly affect the network.
- Disadvantages:
- Complexity: The cabling and configuration can be complicated, especially in a full mesh.
- Cost: More cables and ports are needed, leading to higher expenses.
Other Topologies for Comparison
- Star Topology: All nodes connect to a central hub or switch. If the hub fails, the entire network goes down.
- Tree Topology: This is a hierarchical topology that combines characteristics of star and bus topologies.
- Ring Topology: Each node connects to exactly two other nodes, forming a circular pathway for data.
In conclusion, the completely interconnected (mesh) topology is distinguished by its high connectivity and reliability, making it a preferred choice for critical network applications.

Rearranging and allocating space in memory to provide for multiple computing tasks is called    (SSC CGL 1st Sit. 2015)
  • a)
    Multiprogramming
  • b)
    Multitasking
  • c)
    Memory Management
  • d)
    Networking
Correct answer is option 'C'. Can you explain this answer?

Malavika Rane answered
Understanding Memory Management
Memory management is a critical component of computing that involves rearranging and allocating memory space to accommodate multiple tasks efficiently. It ensures that each process has sufficient memory to operate while optimizing overall system performance.
Key Functions of Memory Management
- Allocation of Memory:
- Memory management allocates memory spaces to various processes and ensures that there is no conflict or overlap.
- Deallocation of Memory:
- When a process finishes execution, memory management frees up allocated resources, making them available for other tasks.
- Memory Protection:
- This ensures that one process does not interfere with the memory allocated to another, maintaining system stability.
- Virtual Memory Management:
- It allows the execution of processes that may not be completely loaded in memory by using disk space to simulate additional memory.
Importance in Computing
- Efficiency:
- By managing memory efficiently, systems can run multiple applications simultaneously without crashing or slowing down.
- Performance:
- Proper memory management enhances the speed and performance of applications by optimizing memory usage.
- Resource Utilization:
- It maximizes the use of available memory, ensuring that resources are allocated effectively to meet the demands of various applications.
Conclusion
In summary, memory management is essential for running multiple computing tasks effectively. It provides a robust framework for allocating, managing, and optimizing memory resources, thereby ensuring smooth and efficient operation of computer systems.

A Group Ware is a      (SSC CGL 2nd Sit. 2011)
  • a)
    Hardware
  • b)
    Network
  • c)
    Software
  • d)
    Firmware
Correct answer is option 'C'. Can you explain this answer?

Malavika Rane answered
Understanding Group Ware
Group ware refers to collaborative software designed to help groups of people work together more effectively, regardless of their physical location. It encompasses various tools and applications that facilitate communication, coordination, and collaboration among team members.
Key Features of Group Ware:
  • Collaboration Tools: Group ware includes features such as shared calendars, project management tools, and document sharing, allowing team members to work on projects simultaneously.
  • Communication: It often integrates messaging, video conferencing, and forums to enhance real-time communication among users.
  • Document Management: Users can create, edit, and manage documents collectively, ensuring that all team members have access to the most current information.
  • Task Management: Group ware typically includes mechanisms for assigning tasks, tracking progress, and setting deadlines, which helps keep projects on schedule.

Why is Group Ware Considered Software?
  • Functionality: Group ware operates through software applications rather than being tied to physical hardware components, making it a software solution.
  • Flexibility: It can be installed on various devices and accessed via the internet, emphasizing its role as a software tool rather than hardware.
  • Continuous Updates: As a software product, group ware can be regularly updated and improved to meet changing user needs, unlike static hardware.

In summary, group ware is classified as software because it primarily serves the purpose of enhancing collaboration through digital means, thus facilitating teamwork and communication.

Which of the following items is not used in Local Area Networks (LANs)?       (SSC CGL 1st Sit. 2012)
  • a)
    Interface Card
  • b)
    Cable
  • c)
    Computer
  • d)
    Modem
Correct answer is option 'C'. Can you explain this answer?

Malavika Rane answered
Understanding Local Area Networks (LANs)
Local Area Networks (LANs) are used to connect computers and devices within a limited geographical area, such as a home, school, or office. Each component in a LAN plays a specific role in enabling communication and connectivity.
Components Used in LANs
- Interface Card:
This is necessary for computers to connect to a network. Network Interface Cards (NICs) allow devices to communicate over the network.
- Cable:
Cables, such as Ethernet cables, are essential for connecting devices in a wired LAN. They transmit data between computers and other network devices.
- Modem:
While primarily used to connect to the Internet, modems can also facilitate communication in a LAN by linking it to a wider network. They convert digital data to analog for transmission over phone lines.
Why a Computer is Not Used Specifically in LANs
- Role of a Computer:
While computers are indeed part of LANs, they are not a component that facilitates the network's operation. Instead, they are endpoints that utilize the network.
- Distinction Between Components and Endpoints:
The question specifically asks for items "used in" LANs, implying components that enable or support the network's functioning. Computers serve as users of the network rather than components that create or maintain it.
Conclusion
Therefore, while computers are integral to the operation of a LAN, they are not considered active components of the network infrastructure. Hence, the correct answer to the question is option 'C' - Computer.

In the context of computers and communication technology, 1 megabyte is equal to ______ . (SSC CHSL 2018)
  • a)
    512 kilobytes
  • b)
    512 bytes
  • c)
    1024 bytes
  • d)
    1024 kilobytes
Correct answer is option 'D'. Can you explain this answer?

EduRev SSC CGL answered
The megabyte is commonly used to measure either 10002 bytes or 10242 bytes. The interpretation of using base 1024 originated as a compromise technical jargon for the byte multiples that needed to be expressed by the powers of 2 but lacked a convenient name.

printer cannot print more than one character at a time. (SSC CHSL 2013)
  • a)
    Line
  • b)
    Daisy-wheel
  • c)
    Laser
  • d)
    Dot-matrix
Correct answer is option 'D'. Can you explain this answer?

The desktop dot matrix printer is the typical character printer that prints one character at a time. It is also called a "serial dot matrix printer" or "serial matrix printer."

The transfer of data from a CPU to peripheral devices of computer is achieved through       (SSC CGL 1st Sit. 2012)
  • a)
    interfaces
  • b)
    buffer memory
  • c)
    modems
  • d)
    computer ports
Correct answer is option 'A'. Can you explain this answer?

Malavika Rane answered
Understanding Data Transfer from CPU to Peripheral Devices
The transfer of data from the CPU to peripheral devices is a crucial aspect of computer architecture. This process is primarily facilitated through interfaces.
What are Interfaces?
- Interfaces serve as communication pathways between the CPU and peripheral devices.
- They allow the CPU to send and receive data to and from devices like printers, keyboards, and storage drives.
Types of Interfaces
- Parallel Interfaces: Transfer multiple bits simultaneously, increasing transfer speed. Examples include the Centronics interface used in printers.
- Serial Interfaces: Transfer data one bit at a time, often used for devices like USB and RS-232 connections. Though slower, they are simpler and more cost-effective for many applications.
Role of Interfaces in Data Transfer
- Data Formatting: Interfaces help in converting data from the CPU's internal format to a format that peripheral devices can understand.
- Control Signals: They manage control signals that dictate when and how data is sent, ensuring synchronization between the CPU and peripherals.
Why Other Options are Less Relevant
- Buffer Memory: While it temporarily holds data during transfer, it does not facilitate the actual transfer process.
- Modems: Primarily used for communication over telephone lines, they are not directly involved in CPU-peripheral data transfers.
- Computer Ports: While they are the physical connection points for interfaces, they do not perform the data transfer function by themselves.
In summary, interfaces are vital for effective communication between the CPU and peripheral devices, making them the correct answer for this question.

DHCP is mainly used to (SSC Stenographer 2016)
  • a)
    Converting IP address to domain name
  • b)
    Multicasting
  • c)
    Provide IP address automatically to the devices
  • d)
    Routing
Correct answer is option 'C'. Can you explain this answer?

Malavika Rane answered
Understanding DHCP
Dynamic Host Configuration Protocol (DHCP) is a network management protocol utilized on IP networks. Its primary function is to simplify the process of managing IP addresses within a network.
Purpose of DHCP
- Automatic IP Address Assignment:
- DHCP automatically assigns IP addresses to devices (clients) on a network, eliminating the need for manual configuration.
- This ensures that each device receives a unique IP address, which is crucial for network communication.
- Efficient Management:
- By using DHCP, network administrators can easily manage a pool of IP addresses.
- When a device connects to the network, it requests an IP address from the DHCP server, which then allocates an available address from the pool.
Benefits of Using DHCP
- Reduced Configuration Errors:
- Manual IP address assignments can lead to errors, such as duplicate IP addresses. DHCP minimizes these errors by automating the process.
- Scalability:
- DHCP is ideal for large networks, as it can manage a vast number of devices without requiring extensive manual input from administrators.
- Dynamic Addressing:
- Devices do not require static IP addresses; they can obtain a new address each time they connect to the network, making it suitable for environments with frequently changing devices.
Conclusion
In summary, the correct answer to the question is option 'C' - DHCP's main role is to provide IP addresses automatically to devices in a network, ensuring efficient and error-free network management.

In operating system, Round Robin Scheduling means: (SSC CHSL 2015)
  • a)
    A kind of scheduling
  • b)
    A process allocation policy
  • c)
    A memory allocation policy
  • d)
    Repetition policy
Correct answer is option 'A'. Can you explain this answer?

Malavika Rane answered
Understanding Round Robin Scheduling
Round Robin Scheduling is a widely used CPU scheduling algorithm in operating systems that aims to provide fair time-sharing among processes. Here’s an in-depth look at what it entails:
Definition
- Round Robin Scheduling is a type of scheduling algorithm.
- It allocates CPU time slices to each process in a circular order, ensuring that each process gets an equal opportunity to execute.
How It Works
- Each process is assigned a fixed time quantum or time slice.
- When a process's time quantum expires, it is placed at the end of the ready queue, and the CPU scheduler moves on to the next process.
- This cycle continues until all processes are completed.
Key Features
- Fairness: Every process gets a chance to execute, preventing starvation.
- Time Sharing: Suitable for time-sharing systems where multiple users interact with the system simultaneously.
- Simplicity: The algorithm is easy to implement and understand.
Advantages
- Promotes responsiveness in interactive systems.
- Balances the load effectively among processes.
- Prevents any single process from monopolizing the CPU.
Limitations
- Performance can degrade if the time quantum is too large, leading to poor turnaround time.
- A very small time quantum can increase the overhead due to frequent context switching.
In conclusion, Round Robin Scheduling is not just a process allocation policy or memory allocation policy; it is fundamentally a scheduling algorithm designed to ensure fairness and efficiency in CPU utilization.

Which of the following is in the ascending order of Data hierarchy ?     (SSC CGL 1st Sit. 2015)
  • a)
    Bit–Byte – Record – Field – Database – File
  • b)
    Byte – Bit – File – Record – Database – Field
  • c)
    Bit– Byte – Field – Record – File – Database
  • d)
    Field – Byte – Bit – Record –  File– Database
Correct answer is option 'C'. Can you explain this answer?

Malavika Rane answered
Understanding Data Hierarchy
Data hierarchy refers to the organization of data in a structured format, ranging from the smallest unit to the largest.
Components of Data Hierarchy
- Bit: The smallest unit of data, representing a binary value (0 or 1).
- Byte: Comprises 8 bits and is the basic addressable element in computer memory.
- Field: A collection of bytes that represent a single data item, such as a name or age.
- Record: A collection of related fields, representing a complete set of information about an entity, like a customer.
- File: A collection of related records stored together, similar to a document.
- Database: An organized collection of files, allowing for efficient retrieval and management of data.
Ascending Order Explanation
In option C: *Bit – Byte – Field – Record – File – Database*, the components are arranged in the correct ascending order:
- Bit to Byte: A byte is made up of 8 bits.
- Byte to Field: A field is a collection of bytes.
- Field to Record: A record contains multiple fields.
- Record to File: A file consists of multiple records.
- File to Database: A database holds multiple files.
Why Other Options are Incorrect
- Option A: Incorrect order, as field should come before record.
- Option B: Incorrectly places File and Record out of sequence.
- Option D: Incorrect order, as the sequence of Bit, Byte, and Field is wrong.
Conclusion
Thus, option C correctly represents the ascending order of data hierarchy, establishing a clear structure from the smallest unit (Bit) to the largest entity (Database).

Data in database at a particular point of time is called as? (SSC CGL 1st Sit. 2016)
  • a)
    Intension
  • b)
    Extension
  • c)
    Back up
  • d)
    Application
Correct answer is option 'B'. Can you explain this answer?

EduRev SSC CGL answered
The data in the database at a particular point of time is known as database instance or database sate or snapshot. The database state is also called an extension of the schema.

CPU Scheduler is also known as _____ . (SSC CGL 1st Sit. 2016)
  • a)
    Job Scheduler
  • b)
    Resource Scheduler
  • c)
    Short-term Scheduler
  • d)
    Process Scheduler
Correct answer is option 'C'. Can you explain this answer?

Ssc Cgl answered
The short-term scheduler (also known as the CPU scheduler) decides which of the ready, in-memory processes is to be executed (allocated a CPU) after a clock interrupt, an I/O interrupt, an operating system call or another form of signal.

Which of the following is not a computer language? (SSC Stenographer 2017)
  • a)
    Fortran
  • b)
    Pascal
  • c)
    Cobol
  • d)
    English
Correct answer is option 'D'. Can you explain this answer?

Ishaan Roy answered
Understanding Computer Languages
Computer languages are formal languages comprising a set of instructions that can be used to produce various kinds of output, primarily for programming and software development. The options provided in the question include both programming languages and a natural language.
Options Explained
- Fortran
Fortran (Formula Translation) is one of the oldest high-level programming languages, primarily used for numerical and scientific computing.
- Pascal
Pascal is a procedural programming language designed for teaching programming concepts and is also used in various applications.
- COBOL
COBOL (Common Business-Oriented Language) is a high-level programming language designed for business, finance, and administrative systems.
- English
English is a natural language used for human communication, not a programming or computer language.
Conclusion
The correct answer is option 'D' (English) because it does not fit the category of computer languages. While Fortran, Pascal, and COBOL are specifically designed for programming and executing algorithms, English is a natural language that humans use for everyday communication.
Understanding these distinctions is crucial for anyone involved in the field of computer science or programming.

What type of information system would be recognised by digital circuits ?    (SSC CGL 1st Sit. 2013)
  • a)
    Hexadecimal system
  • b)
    Binary system
  • c)
    Both hexadecimal and binary system
  • d)
    Only Roman system
Correct answer is option 'B'. Can you explain this answer?

Malavika Rane answered
Understanding Digital Circuits and Number Systems
Digital circuits operate using binary systems, which are fundamental to computer architecture and electronic devices. Here’s a detailed explanation of why the binary system is recognized by digital circuits:
Binary System Basics
- The binary system consists of only two digits: 0 and 1.
- Each digit is known as a "bit," which is the smallest unit of data in computing.
Why Binary Is Essential
- Digital circuits are based on two states: ON and OFF.
- These states correspond to the binary digits, where:
- 1 represents the ON state (high voltage).
- 0 represents the OFF state (low voltage).
Hexadecimal and Roman Systems
- The hexadecimal system uses sixteen symbols (0-9 and A-F) but requires conversion to binary for digital circuits to process.
- The Roman numeral system is not a positional number system and is not suitable for digital representation.
Conclusion
- Digital circuits inherently recognize and operate using the binary system due to its simplicity and direct correlation with electronic states.
- Hence, while hexadecimal may be used in programming and debugging, it ultimately relies on binary for execution.
Therefore, the correct answer to the question is option 'B': the binary system.

'C' language is a      (SSC CGL 2nd Sit. 2010)
  • a)
    Low level language
  • b)
    High level language
  • c)
    Machine level language
  • d)
    Assembly level language
Correct answer is option 'B'. Can you explain this answer?

Malavika Rane answered
Understanding C Language as a High-Level Language
The classification of programming languages helps in understanding their functionalities and applications. C is widely recognized as a high-level language, and here’s why:
1. Abstraction from Hardware
- C provides a significant level of abstraction from the underlying hardware.
- Developers do not need to manage hardware details, such as memory management and CPU instructions, directly.
2. Readability and Maintainability
- Code written in C is more understandable and easier to read compared to low-level languages.
- This enhances maintainability, allowing programmers to write complex programs more efficiently.
3. Portability
- C code can be compiled and run on different platforms with minimal modifications.
- This portability is a hallmark of high-level languages, allowing for broader application development.
4. Rich Set of Libraries
- C includes a comprehensive set of libraries that provide pre-written functions for various tasks, such as input/output operations, string handling, and mathematical computations.
- These libraries simplify programming tasks and enhance productivity.
5. Structured Programming Support
- C supports structured programming principles, enabling the organization of code into functions and modules.
- This results in better management of complex systems and improves code reuse.
Conclusion
Overall, C is classified as a high-level language due to its abstraction, readability, portability, rich libraries, and support for structured programming. These features make it a powerful tool for software development, distinguishing it from low-level and assembly languages that require more direct manipulation of hardware resources.

What is the full form of JPEG?          (SSC CGL 2017)
  • a)
    Joint Project Experts Group
  • b)
    Joint Protocol Experts Graphics.
  • c)
    Joint Programming Experts Graphics
  • d)
    Joint Photographic Experts Group
Correct answer is option 'D'. Can you explain this answer?

Abhiram Mehra answered
The correct answer is option 'A' - Joint Photographic Experts Group.

Explanation:
The full form of JPEG is Joint Photographic Experts Group. JPEG is a commonly used method of lossy compression for digital images. It is a file format that allows for the storage and transmission of images with a high level of compression.

JPEG is a standard created by the Joint Photographic Experts Group, which is a committee of experts from various organizations and companies. The committee was formed in 1986 with the goal of developing a standard for the compression and storage of digital images.

The JPEG compression algorithm works by reducing the file size of an image by selectively discarding some of the image data. This results in a loss of image quality, but the extent of the loss can be controlled by adjusting the compression level.

JPEG is widely used in various applications and devices, including digital cameras, web pages, and image editing software. It is particularly well-suited for compressing photographs and other complex images with many colors and details.

In summary, the full form of JPEG is Joint Photographic Experts Group. It is a widely used method of image compression and storage, developed by a committee of experts from various organizations and companies.

FORTRAN is not used for ________. (SSC CGL 2017)
(I) Drawing pictures
(II) Carrying  out mathematics computations
  • a)
    Only (I)
  • b)
    Only (II)
  • c)
    Both (I) and (II)
  • d)
    Neither (I) nor (II)
Correct answer is option 'A'. Can you explain this answer?

Ssc Cgl answered
FORTRAN (FORmula TRANsla tion ) is a thirdgeneration (3GL) programming language that was designed for use by engineers, mathematicians, and other users and creators of scientific algorithms.

Chapter doubts & questions for Computers - SSC CGL Previous Year Papers 2026 is part of SSC CGL exam preparation. The chapters have been prepared according to the SSC CGL exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for SSC CGL 2026 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Computers - SSC CGL Previous Year Papers in English & Hindi are available as part of SSC CGL exam. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free.

Top Courses SSC CGL