SSC CGL Tier 2 exam includes a Computer Awareness section that tests candidates on basic to intermediate computer concepts. Practicing the most repeated questions can help you quickly improve your score. This blog has frequently asked questions from previous SSC CGL Tier 2 exams. This article covers the SSC CGL Tier 2 Computer Awareness syllabus, most repeated questions with answers, a downloadable PDF, and preparation tips to boost speed and accuracy.
Most Repeated Computer Awareness Questions PDF
Practicing the Most Repeated Computer Awareness Questions for SSC Exams helps in quick revision and improve accuracy in the exam. In the PDF below, you will get 100 Most Repeated Computer Awareness Questions. This free resource is designed to help you revise quickly, strengthen your concepts, and improve accuracy in the Computer Awareness section.
SSC CGL Computer Awareness Questions
Below are some SSC CGL computer questions covering advanced topics like networking, databases, and cybersecurity, designed to match Tier 1 and Tier 2 difficulty.
1. In computer architecture, what does the term “pipeline hazard” mainly refer to?
a) A fault in instruction cache
b) A delay caused by instruction dependency
c) A memory segmentation error
d) A buffer overflow condition
Correct Answer: b) A delay caused by instruction dependency
Explanation: Pipeline hazards occur when an instruction cannot execute in the next cycle due to data, control, or structural conflicts.
2. Which RAID level provides both data striping and mirroring?
a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 10
Correct Answer: d) RAID 10
Explanation: RAID 10 combines mirroring and striping, offering high performance with redundancy.
3. In DBMS, the highest level of data abstraction is:
a) Physical level
b) Logical level
c) View level
d) Conceptual level
Correct Answer: d) Conceptual level
Explanation: The conceptual level shows the overall logical structure of the data without implementation details.
4. Which scheduling algorithm may lead to starvation in Operating Systems?
a) Round Robin
b) First Come First Serve
c) Shortest Job Next (SJN)
d) Priority Scheduling
Correct Answer: d) Priority Scheduling
Explanation: Low priority processes may wait indefinitely if higher priority processes keep arriving.
5. In cryptography, AES uses which block size?
a) 64-bit
b) 128-bit
c) 192-bit
d) 256-bit
Correct Answer: b) 128-bit
Explanation: AES uses a fixed block size of 128 bits, regardless of the key size.
6. The “sticky bit” in UNIX file system is mainly used to:
a) Restrict file deletion to the file owner
b) Encrypt files in directory
c) Deny execution permissions
d) Allocate swap space
Correct Answer: a) Restrict file deletion to the file owner
Explanation: The sticky bit ensures that in shared directories like /tmp, only the file owner can delete or rename their files.
7. Which protocol works at the transport layer and is connectionless?
a) TCP
b) UDP
c) ICMP
d) IP
Correct Answer: b) UDP
Explanation: UDP is a connectionless transport layer protocol, unlike TCP which is connection-oriented.
8. What is the worst-case time complexity of quicksort?
a) O(n log n)
b) O(n²)
c) O(log n)
d) O(n)
Correct Answer: b) O(n²)
Explanation: Quicksort degrades to O(n²) when pivot selection is poor, such as choosing extremal elements in a sorted array.
9. Which addressing mode is used in the instruction: MOV AX, [BX+SI+10H]?
a) Direct addressing
b) Immediate addressing
c) Register indirect addressing
d) Indexed addressing
Correct Answer: d) Indexed addressing
Explanation: It uses a base register (BX), index register (SI), and displacement (10H), which is indexed addressing.
10. Which type of memory is used to store the BIOS settings of a computer?
a) EEPROM
b) Cache memory
c) Flash memory
d) Virtual memory
Correct Answer: a) EEPROM
Explanation: BIOS settings are stored in EEPROM, which retains data even when the system is powered off.
11. In MS Word, which feature allows you to create a dynamic table of contents that updates automatically?
a) Indexing
b) Outline View
c) Cross-reference
d) Field Codes
Correct Answer: d) Field Codes
Explanation: Field codes allow Word to generate and update a Table of Contents automatically based on heading styles.
12. Which function in MS Excel is used to return the relative position of a value within a range?
a) VLOOKUP
b) RANK
c) MATCH
d) INDEX
Correct Answer: c) MATCH
Explanation: MATCH returns the position of a value in a range, while INDEX returns the value at that position.
13. In MS PowerPoint, which view is best suited for arranging slide order and applying transitions?
a) Slide Sorter View
b) Outline View
c) Reading View
d) Notes Page View
Correct Answer: a) Slide Sorter View
Explanation: Slide Sorter View is ideal for rearranging slides and applying transitions efficiently.
14. Which protocol is most commonly used for sending emails?
a) FTP
b) SMTP
c) IMAP
d) POP3
Correct Answer: b) SMTP
Explanation: SMTP handles sending emails, while IMAP and POP3 handle retrieving them.
15. What is the keyboard shortcut to open Windows File Explorer directly?
a) Ctrl + E
b) Windows Key + E
c) Alt + F
d) Ctrl + Alt + E
Correct Answer: b) Windows Key + E
Explanation: Pressing Windows + E opens File Explorer instantly.
16. Which of the following is NOT an information security threat?
a) Worms
b) Phishing
c) Trojan
d) Data Encryption
Correct Answer: d) Data Encryption
Explanation: Encryption protects data; worms, phishing, and Trojans are security threats.
17. In networking, which device operates at Layer 3 of the OSI model?
a) Hub
b) Switch
c) Router
d) Repeater
Correct Answer: c) Router
Explanation: Routers operate at the Network Layer and use IP addresses to make routing decisions.
18. Which shortcut in MS Excel inserts the current date in a cell?
a) Ctrl + Shift + D
b) Ctrl + ;
c) Alt + D
d) Ctrl + Shift + ;
Correct Answer: b) Ctrl + ;
Explanation: Ctrl + ; inserts the current date, while Ctrl + Shift + ; inserts the current time.
19. Which of the following is an example of asymmetric encryption?
a) AES
b) DES
c) RSA
d) Blowfish
Correct Answer: c) RSA
Explanation: RSA uses a public and private key pair, making it asymmetric.
20. In web browsing, which of the following HTTP status codes means “Forbidden”?
a) 200
b) 301
c) 403
d) 404
Correct Answer: c) 403
Explanation: A 403 status code means the server understood the request but refuses to authorize it.
SSC CGL Tier 2 Computer Awareness Syllabus
The Computer Awareness syllabus for SSC CGL Tier 2 mainly includes:
| Sections | Topics |
| Computer Basics | Central Processing Unit (CPU), Input/Output Devices, Computer Memory, Memory Organization, Back-up Devices, Classification of a computer, Ports, Windows Explorer, Keyboard Shortcuts, Microprocessor & Microcontroller |
| Software | Windows Operating System & MS Office including basics of Microsoft Office like MS Word, MS Excel PowerPoint, etc. Database & SQL Basics |
| Working with the Internet and e-mails | Web Browsing & Searching Downloading & Uploading Managing an E-mail Account e-Banking. |
| Basics of networking and cybersecurity | Networking devices and protocols Network and information security threats (like hacking, viruses, worms, Trojans, etc.), and preventive measures. |
| Miscellaneous | Computer Abbreviations & Terminology Cybersecurity & IT Awareness |
Preparation Tips for Computer Awareness Section
A strong SSC CGL Preparation Strategy includes focusing on the Computer Awareness section, as it can help secure easy marks if prepared well. Here are some effective tips to boost your performance:
- Focus on basic concepts, OS, software, networking, and abbreviations.
- Make short notes for repeated topics and commonly asked questions.
- Revise most repeated questions from previous SSC CGL exams.
- Take mock tests to improve speed and accuracy.
- Practice MS Office, shortcuts, and internet tools regularly.
Qualified SSC CGL Tier 1? Get ready for Tier 2, check out the below blogs:
FAQs
Q1. What is the Computer Awareness section in SSC CGL Tier 2?
It tests candidates on basic to intermediate computer concepts, software, networking, and abbreviations.
Topics include basic computer concepts, OS, software, networking, abbreviations, and emerging technologies.
Focus on basics, make short notes, revise repeated questions, take mock tests, and practice MS Office and shortcuts.
Yes, you can download PDFs of most repeated Computer Awareness questions with solutions for offline practice.
Yes, practicing repeated questions helps in quick revision and improving accuracy.
- SSC CGL 2025 Tier 1 PYPs, Shift-Wise Previous Papers, Download PDFs
- SSC CGL Tier 2 Paper 1 Preparation Tips, Check now
- SSC CGL टॉप 5 हाई पेइंग जॉब्स कौन-सी हैं?, पूरी जानकारी यहां
- SSC CGL की तैयारी के लिए सबसे अच्छी किताबें कौन-सी हैं? यहां चेक करें
- SSC CGL पोस्ट प्रेफरेंस, SSC CGL की सबसे अच्छी पोस्ट क्या है?
- SSC CGL के लिए योग्यता क्या है? आयु सीमा, शिक्षा, शारीरिक मापदंड और अधिक

I’m Mahima Khurana, a writer with a strong passion for creating meaningful, learner-focused content especially in the field of competitive exam preparation. From authoring books and developing thousands of practice questions to crafting articles and study material, I specialize in transforming complex exam-related topics into clear, engaging, and accessible content. I have first hand experience of 5+ months in SSC Exams. Writing, for me, is not just a skill but a way to support and guide aspirants through their preparation journey one well-written explanation at a time.