Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is a domain? a) The physical location of a website's server. b) The unique address used to access a website on the internet. c) The software used to host a website. d) The company that owns a website. 2 / 30 2. What is the decimal equivalent of the binary number 11100? a) 20 b) 24 c) 28 d) 32 3 / 30 3. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 4 / 30 4. What are some examples of video editing software? a) Adobe Premiere Pro, Final Cut Pro, Sony Vegas Pro. b) Microsoft Word, Google Docs, Microsoft Excel. c) Windows Media Player, VLC Media Player, iTunes. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 5 / 30 5. What are intellectual property rights in computing? a) The rights granted to individuals or organizations to control the use and distribution of their creative works, inventions, and discoveries. b) The protection of computer systems and data from threats, such as viruses, hackers, and cyber attacks. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 6 / 30 6. What are deep learning networks? a) Neural networks with multiple hidden layers, capable of learning hierarchical representations of data and solving complex tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. Which network topology connects all devices to a central hub or switch? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 8 / 30 8. What is a Git merge, and how does it work in version control? a) Git merge is a version control operation that combines changes from one branch into another, integrating new features, bug fixes, or changes made in a feature branch back into the main branch or another target branch, preserving the commit history and resolving conflicts if necessary. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 9 / 30 9. What are the primary functions of cache memory in the memory hierarchy? a) To provide temporary storage for data and instructions that are currently being processed by the CPU. b) To store frequently accessed data and instructions to speed up processing. c) To provide long-term storage for data and instructions. d) To manage communication between the CPU and other components of the computer system. 10 / 30 10. What are other accessories commonly used with computer systems? a) Devices used for input and output operations. b) Peripheral devices used for connecting to a network. c) Additional components or devices used to enhance the functionality or protect computer systems. d) Software applications used for managing computer hardware. 11 / 30 11. What role does the Scrum Master play in Scrum, an Agile methodology? a) The Scrum Master is responsible for facilitating the Scrum process, coaching the development team on Agile principles and practices, removing impediments, and fostering a culture of continuous improvement. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. What role does the Product Owner play in Agile Development Methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The Product Owner is responsible for representing the interests of the stakeholders, defining and prioritizing the product backlog, and ensuring that the development team delivers value to the customer. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What is graphics software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for word processing and document creation. c) Software used for managing computer networks and resources. d) Software used for playing multimedia files. 14 / 30 14. What is malware? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 15 / 30 15. What is the concept of smart cities in IoT? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The integration of IoT technologies to enhance the efficiency, sustainability, and livability of urban environments. d) The physical components of a computer system. 16 / 30 16. What is computer security? a) The protection of computer hardware from physical damage. b) The prevention of unauthorized access to computer systems and data. c) The process of optimizing computer performance. d) The development of new computer technologies. 17 / 30 17. What is the binary representation of the decimal number 15? a) 1111 b) 1010 c) 1101 d) 1001 18 / 30 18. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) A type of malware. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 19 / 30 19. What is descriptive analytics in data analytics? a) Descriptive analytics involves summarizing and visualizing data to understand historical trends, patterns, and relationships. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 20 / 30 20. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 21 / 30 21. Which type of memory is volatile and used for temporary storage of data and program instructions during the operation of a computer? a) RAM b) ROM c) Cache Memory d) Virtual Memory 22 / 30 22. What is encryption? a) The process of hiding computer hardware from physical damage. b) The process of transforming plaintext data into ciphertext to make it unreadable to unauthorized users. c) The process of optimizing computer performance. d) The development of new computer technologies. 23 / 30 23. What are the key benefits of using a Version Control System (VCS) in software development? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The key benefits of using a Version Control System (VCS) include versioning and history tracking, collaboration and team coordination, conflict resolution, backup and disaster recovery, and code quality and stability. 24 / 30 24. What is the goal of AI in robotics? a) To create robots that can perform tasks more efficiently and effectively than humans. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) To develop robots with human-like intelligence and consciousness. 25 / 30 25. What are some common uses of scanners? a) Digitizing documents, photos, artwork, and other printed materials. b) Recording audio, editing videos, creating graphics. c) Playing video games, controlling drones, capturing virtual reality content. d) Video conferencing, live streaming, online gaming. 26 / 30 26. How many bits are in a kilobyte (KB)? a) 8000 b) 8192 c) 10240 d) 102400 27 / 30 27. How many bits are in a byte? a) 4 b) 8 c) 16 d) 32 28 / 30 28. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 29 / 30 29. What is the Internet? a) A global network of interconnected computers and devices. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 30 / 30 30. What is computer vision? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A subset of AI that focuses on analyzing and interpreting visual information from images or videos. d) The physical components of a computer system. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study