Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What are some common algorithms used in supervised learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Common algorithms used in supervised learning include linear regression, logistic regression, decision trees, random forests, support vector machines (SVM), and neural networks. 2 / 30 2. What is flowchart? a) A programming language used for writing code. b) A type of malware. c) A visual representation of the sequence of steps and decision points in an algorithm or process, using symbols and arrows to depict the flow of control. d) The process of executing a program. 3 / 30 3. What is ransomware? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware that encrypts files or locks computer systems, demanding payment (ransom) for their release. 4 / 30 4. What are some types of machine learning algorithms? a) Supervised learning, unsupervised learning, reinforcement learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is two-factor authentication (2FA)? a) A type of encryption algorithm. b) A password policy requiring users to change their passwords regularly. c) A security mechanism that requires users to provide two different authentication factors to verify their identity. d) A type of firewall. 6 / 30 6. What is robotics? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A field of AI and engineering that focuses on designing, building, and programming robots to perform tasks autonomously or semi-autonomously. d) The physical components of a computer system. 7 / 30 7. How many kilobytes are in a gigabyte (GB)? a) 1,048,576 b) 1,024,000 c) 1,000,000 d) 1,024 8 / 30 8. Which type of memory is faster but smaller in size compared to main memory, and is used to store frequently accessed data and instructions? a) RAM b) ROM c) Cache Memory d) Virtual Memory 9 / 30 9. What is reinforcement learning in machine learning? a) Reinforcement learning is a type of machine learning where the algorithm learns through trial and error by interacting with an environment, receiving feedback or rewards based on its actions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 10 / 30 10. What are some popular programming languages used in machine learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some popular programming languages used in machine learning include Python, R, Java, and Julia. 11 / 30 11. What are the key roles in Scrum, an Agile methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The key roles in Scrum include the Product Owner, Scrum Master, and Development Team, each with distinct responsibilities and contributions to the Agile development process. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. Which type of memory is directly accessed by the CPU for storing and retrieving data and instructions during program execution? a) RAM b) ROM c) Cache Memory d) Virtual Memory 13 / 30 13. Why is ethics important in the field of computing? a) Ethics is important in computing to ensure that technology is developed, used, and managed in a responsible, ethical, and socially acceptable manner, considering the impact on individuals, society, and the environment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 14 / 30 14. Which programming language is commonly used for implementing deep learning algorithms? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Python is commonly used for implementing deep learning algorithms due to its extensive libraries and frameworks such as TensorFlow, PyTorch, and Keras. 15 / 30 15. What is the decimal equivalent of the binary number 100110? a) 38 b) 42 c) 46 d) 50 16 / 30 16. What are some common applications of Augmented Reality (AR)? a) Common applications of Augmented Reality (AR) include mobile apps, gaming, retail, advertising, navigation, industrial training, and healthcare. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. Which network device operates at the Physical layer of the OSI model and simply repeats incoming electrical signals to all connected devices? a) Hub b) Switch c) Router d) Bridge 18 / 30 18. Which type of memory is used to expand the effective size of the main memory by using a portion of the hard disk as an extension? a) RAM b) ROM c) Cache Memory d) Virtual Memory 19 / 30 19. What is a cooling pad? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 20 / 30 20. How many bits are in a byte? a) 4 b) 8 c) 16 d) 32 21 / 30 21. What are some common types of game controllers? a) Gamepads, joysticks, steering wheels, motion controllers. b) Keyboards, mice, touchpads, styluses. c) Webcams, scanners, printers, microphones. d) Monitors, speakers, headphones, projectors. 22 / 30 22. What is main memory in the memory hierarchy? a) The fastest and smallest type of computer memory located within the CPU. b) The largest and slowest type of computer memory used for long-term storage. c) A type of programming language. d) The software used for managing computer hardware. 23 / 30 23. What is a Git remote, and how is it used in version control? a) A Git remote is a reference to a remote repository hosted on a server or another location, enabling developers to push and pull changes between local and remote repositories, collaborate with distributed teams, and synchronize project updates. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 24 / 30 24. What is the main advantage of using cloud-based word processing software like Google Docs? a) Offline access to documents. b) Real-time collaboration and sharing of documents with others. c) Advanced formatting and design options. d) Integration with desktop applications. 25 / 30 25. How many bytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 26 / 30 26. What is a Database Management System (DBMS)? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) A software system that enables users to create, manage, and access databases efficiently, providing features for data storage, retrieval, manipulation, and security. 27 / 30 27. What is a Trojan horse? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware disguised as legitimate software that appears harmless but contains malicious code that performs unauthorized actions when executed. 28 / 30 28. What are some common uses of scanners? a) Digitizing documents, photos, artwork, and other printed materials. b) Recording audio, editing videos, creating graphics. c) Playing video games, controlling drones, capturing virtual reality content. d) Video conferencing, live streaming, online gaming. 29 / 30 29. What are some applications of natural language processing? a) Language translation, sentiment analysis, chatbots, text summarization, speech recognition. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. What is the binary representation of the decimal number 63? a) 110011 b) 111111 c) 100101 d) 101011 Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs: Click to share on Facebook (Opens in new window) Facebook Click to share on WhatsApp (Opens in new window) WhatsApp Click to share on X (Opens in new window) X Click to share on LinkedIn (Opens in new window) LinkedIn Click to share on Reddit (Opens in new window) Reddit