Google News
logo
General Knowledge(GK) (or) General Awareness

Welcome to the General Knowledge Section of Free Time Learning. As we are aware General Knowledge (GK) is a very important area in all the competitive exams held in the country. Nowadays, a good knowledge of general awareness is very important in clearing any competitive and government recruitment examinations.

These General Knowledge Question are very important and usefull to UPSC, IAS/PCS, UPPSC, IBPS, SBI, RBI, SSC, CGL, Railway, APPSC, TSPSC, KPSC, TNPSC, TPSC, UPPSC, MPSC, RPSC, BPSC, MPPSC, UKPSC, MPSC, and other competitive exams.

A)
Flip Flop
B)
Vector
C)
Encoder
D)
Register

Correct Answer :   Flip Flop


In electronics, a flip-flop or latch is a circuit that has two stable states and can be used to store state information.A flip-flop stores a single bit (binary digit) of data; one of its two states represents a “one” and the other represents a “zero”. Such data storage can be used for storage of state, and such a circuit is described as sequential logic. When used in a finite state machine, the output and next state depend not only on its current input, but also on its current state.

Published On : June 17, 2021
A)
USA
B)
India
C)
China
D)
Russia

Correct Answer :   China


* Chaina : 854,000,000 Users
India: 560,000,000 Users
USA : 313,322,868 Users
Russia : 116,353,942 Users

Published On : June 17, 2021
A)
Pathing
B)
Directing
C)
Selecting
D)
Routing

Correct Answer :   Routing


In order to transfer packets from a sending host to the destination host, the network layer must determine the path that the packets are to follow. Routing is the process by which systems decide where to send a packet. It directs network packets from their source toward their destination through intermediate network nodes by specific packet forwarding mechanisms.

Published On : June 17, 2021
A)
BCD Number System
B)
Binary Number System
C)
Decimal Number System
D)
Excess 3-Code

Correct Answer :   Excess 3-Code


The weighted codes are those that obey the position weighting principle, which states that the position of each number represent a specific weight. In weighted codes, each digit is assigned a specific weight according to its position. Non-weighted or un-weighted codes are those codes in which the digit value does not depend upon their position i.e., each digit position within the number is not assigned fixed value. Examples of non-weighted codes are: Un-weighted BCD code, Excess-3 code and gray code.

Published On : June 17, 2021
A)
Circulatory
B)
Human brain
C)
Computer programs
D)
Chemical storage devices

Correct Answer :   Human brain


Wetware is a term drawn from the computer-related idea of hardware or software, but applied to biological life forms. Here the prefix “wet” is a reference to the water found in living creatures. Wetware is used to describe the elements equivalent to hardware and software found in a person, namely the central nervous system (CNS) and the human brain.

Published On : June 17, 2021
A)
Write – back
B)
Cache – write
C)
Write – through
D)
Protected – write

Correct Answer :   Write – back


The write-back method involves updating only the cache location and to mark it as updated with an associated flag bit, often called the dirty or modified bit. The main memory location of the word is updated later, when the block containing this marked word is to be removed from the cache to make room for a new block. The reason for the write back method is that during the time a word resides in the cache, it may be updated several times.

Published On : June 17, 2021
A)
Wired Extra Privacy
B)
Wired Equivalent Privacy
C)
Wireless Embedded Privacy
D)
Wireless Equivalent Privacy

Correct Answer :   Wired Equivalent Privacy


WEP stands for Wired Equivalent Privacy. It is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standards ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. It was superseded by Wi-Fi Protected Access (WPA) in 2003.

Published On : June 17, 2021
A)
Path
B)
Bond
C)
Protocol
D)
SLA

Correct Answer :   Protocol


In information technology, a protocol is an agreement between the communicating parties on how communication is to proceed. Violating the protocol makes communication more difficult, if not impossible. A protocol is the specialist set of rules that end points in a telecommunication connection.

Published On : June 17, 2021
A)
Inbuilt circuit
B)
Internal circuit
C)
Independent circuit
D)
Integrated circuit

Correct Answer :   Integrated circuit


IC stands for Integrated Circuit. It is a set of electronic circuits on one small plate (“chip”) of semiconductor material, normally silicon. Also known as chip or microchip, ICs are the heart and brains of most circuits and are are a keystone of modern electronics.

Published On : June 17, 2021
A)
Disc
B)
Cache
C)
Accumulator
D)
Stack Pointer

Correct Answer :   Cache


The memory buffer used to accommodate a speed differential is called cache. It is a hardware or software component that stores data so future requests for that data can be served faster. Cache serves to add fast memory between the CPU and main memory.

Published On : June 17, 2021