Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which network component converts digital signals from a computer into analog signals suitable for transmission over analog communication lines? a) Router b) Switch c) Modem d) Hub 2 / 30 2. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 3 / 30 3. What are some examples of IoT applications in healthcare? a) Remote patient monitoring, wearable health trackers, smart medical devices, telemedicine. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 4 / 30 4. What is a cryptocurrency in the context of blockchain? a) Digital or virtual currencies that use cryptography for secure transactions and operate on decentralized blockchain networks. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 5 / 30 5. Which type of network may utilize technologies such as leased lines, fiber optics, and satellite links for long-distance communication? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 6 / 30 6. What activities are typically performed during the Maintenance phase of the Software Development Life Cycle (SDLC)? a) Activities performed during the Maintenance phase include bug fixing, enhancements, updates, optimizations, and ongoing support and maintenance to ensure the continued reliability, usability, and performance of the software system. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. Which network device operates at the Physical layer of the OSI model and simply repeats incoming electrical signals to all connected devices? a) Hub b) Switch c) Router d) Bridge 8 / 30 8. What is accessibility in computing? a) The protection of personal information and data from unauthorized access or disclosure. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) The design and implementation of technology to ensure equal access and usability for individuals with disabilities. 9 / 30 9. What is Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Agile Development Methodology is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback throughout the development process. d) The study of computer algorithms and data structures. 10 / 30 10. What are some advantages of external hard drives? a) Portable, easy to connect, and offer high storage capacity. b) Fixed in place, difficult to connect, and offer limited storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 11 / 30 11. Which type of network covers a small geographical area, typically within a single building or campus? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 12 / 30 12. What is cybersecurity? a) The process of securely storing data on computer systems. b) The protection of computer systems and networks from cyber threats, such as hackers, malware, and data breaches. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 13 / 30 13. What is Google Slides? a) A search engine developed by Google. b) A cloud-based presentation software developed by Google for creating and delivering slideshows online. c) An email service developed by Google. d) A social media platform developed by Google. 14 / 30 14. What are the advantages of using R for machine learning? a) The advantages of using R for machine learning include powerful statistical capabilities, extensive libraries, interactive visualization, and a vibrant community of users and developers. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What is a Trojan horse? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware disguised as legitimate software that appears harmless but contains malicious code that performs unauthorized actions when executed. 16 / 30 16. What is reinforcement learning in machine learning? a) Reinforcement learning is a type of machine learning where the algorithm learns through trial and error by interacting with an environment, receiving feedback or rewards based on its actions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 17 / 30 17. What is Git, and how does it differ from other Version Control Systems (VCS)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Git is a distributed version control system (DVCS) that allows developers to work offline and independently, with each user having a complete copy of the repository on their local machine, enabling faster operations, branching, and merging compared to centralized VCS like SVN. d) The study of computer algorithms and data structures. 18 / 30 18. What are some common uses of projectors? a) Presentations, lectures, movie screenings, digital signage. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Video conferencing, live streaming, online gaming. 19 / 30 19. What is a website? a) A physical device used to connect computers to the internet. b) A collection of networked computers sharing resources. c) A software application used for communication between computers. d) A collection of web pages accessible via the World Wide Web. 20 / 30 20. What is exploratory data analysis (EDA) in data analytics? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Exploratory data analysis (EDA) involves exploring and visualizing data to gain insights, identify patterns, and formulate hypotheses for further analysis. 21 / 30 21. What is the main advantage of using cloud-based spreadsheet software like Google Sheets? a) Offline access to spreadsheets. b) Real-time collaboration and sharing of spreadsheets with others. c) Advanced data analysis tools. d) Integration with desktop applications. 22 / 30 22. What are the different types of databases supported by DBMS? a) Relational databases, NoSQL databases, object-oriented databases, hierarchical databases. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 23 / 30 23. What is privacy in computing? a) The process of securely storing data on computer systems. b) The protection of personal information and data from unauthorized access or disclosure. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 24 / 30 24. What are some common applications of Augmented Reality (AR)? a) Common applications of Augmented Reality (AR) include mobile apps, gaming, retail, advertising, navigation, industrial training, and healthcare. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. What is a Git remote, and how is it used in version control? a) A Git remote is a reference to a remote repository hosted on a server or another location, enabling developers to push and pull changes between local and remote repositories, collaborate with distributed teams, and synchronize project updates. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 26 / 30 26. Which type of memory is faster but smaller in size compared to main memory, and is used to store frequently accessed data and instructions? a) RAM b) ROM c) Cache Memory d) Virtual Memory 27 / 30 27. What is prescriptive analytics in data analytics? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Prescriptive analytics involves providing recommendations and decision support based on insights derived from descriptive and predictive analytics. d) The study of computer algorithms and data structures. 28 / 30 28. Which programming language is often considered the best for beginners in machine learning? a) Python is often considered the best programming language for beginners in machine learning due to its simplicity, readability, and extensive libraries. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 29 / 30 29. Which network component operates at the Physical layer of the OSI model and simply repeats incoming signals to all connected devices? a) Router b) Switch c) Modem d) Hub 30 / 30 30. What is the role of cybersecurity regulations in mitigating cybercrime risks and protecting digital assets? a) Cybersecurity regulations play a critical role in mitigating cybercrime risks and protecting digital assets by establishing legal requirements, standards, and guidelines for organizations to implement comprehensive cybersecurity measures, practices, and controls to safeguard sensitive information, prevent data breaches, and respond effectively to cyber threats and incidents, ensuring compliance with regulatory requirements, protecting consumer privacy, and enhancing cybersecurity resilience and readiness across industries and sectors. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs:Click to share on Facebook (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on X (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)