Google News
logo
General Knowledge(GK) (or) General Awareness

Welcome to the General Knowledge Section of Free Time Learning. As we are aware General Knowledge (GK) is a very important area in all the competitive exams held in the country. Nowadays, a good knowledge of general awareness is very important in clearing any competitive and government recruitment examinations.

These General Knowledge Question are very important and usefull to UPSC, IAS/PCS, UPPSC, IBPS, SBI, RBI, SSC, CGL, Railway, APPSC, TSPSC, KPSC, TNPSC, TPSC, UPPSC, MPSC, RPSC, BPSC, MPPSC, UKPSC, MPSC, and other competitive exams.

A)
TCS
B)
Wipro
C)
Infosys
D)
Mahindra

Correct Answer : Option (A) - TCS


Tata Consultancy Services emerged the country’s No. 1 software exporter in 2001-02 with an export earning of Rs. 3,882 crore. Infosys occupied the second position with Rs. 2,553 crore while Wipro was the third-largest software exporter with export revenue of Rs. 2,298 crore.

Published On : June 16, 2021
A)
.jpeg
B)
.gif
C)
.png
D)
.mdb

Correct Answer : Option (D) - .mdb


The most common image file formats, the most important for cameras, printing, scanning, and internet use, are JPG, TIF, PNG, and GIF. In computing, .mdb file-extension is used in certain versions of Microsoft Access databases.

Published On : June 16, 2021
A)
One
B)
Two
C)
Three
D)
Four

Correct Answer : Option (C) - Three


Electronic mail, most commonly referred to as email, is a method of exchanging digital messages from an author to one or more recipients. Normally, there could be three types of recipients: the target recipient; a carbon copy (Cc) recipients; and blind carbon copy (Bcc) recipients.

Published On : June 16, 2021
A)
Single user
B)
Multi-user
C)
Distributed Processing
D)
Real-Time Processing

Correct Answer : Option (B) - Multi-user


UNIX is a popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. Created by just a handful of programmers, UNIX was designed to be a small, flexible system used exclusively by programmers. It was designed to be portable, multi-tasking and multi-user in a timesharing configuration.

Published On : June 16, 2021
A)
Machine Language
B)
Command Language
C)
Markup Language
D)
Modeling language

Correct Answer : Option (D) - Modeling language


A modeling language is any artificial language that can be used to express information or knowledge or systems in a structure that is defined by a consistent set of rules. The rules are used for interpretation of the meaning of components in the structure.

Published On : June 16, 2021
A)
a programming language
B)
an operating system
C)
a software
D)
None of the above

Correct Answer : Option (A) - a programming language


Published On : June 16, 2021
A)
Double
B)
Triple
C)
Half
D)
Whole

Correct Answer : Option (D) - Whole


Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption softwareor hardware to encrypt every bit of data that goes on.

Published On : June 16, 2021
A)
Byte-operation
B)
Bit-operation
C)
Micro-operation
D)
Macro-operation

Correct Answer : Option (C) - Micro-operation


The operations executed on data stored in registers are called Micro-operations. Micro operation is an elementary operation performed (during one clock pulse), on the information stored in one or more registers. Examples of microoperation include: shift, load, clear, increment, count, etc.

Published On : June 16, 2021
A)
Sensor networks
B)
Pervasive computing
C)
Trails
D)
None of the above

Correct Answer : Option (B) - Pervasive computing


Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers. Pervasive computing devices are network-connected and constantly available.

Published On : June 16, 2021
A)
Error propagation
B)
Deadlock
C)
Congestion
D)
Access control

Correct Answer : Option (C) - Congestion


Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of new connections. Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.

Published On : June 16, 2021