Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is prescriptive analytics in data analytics? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Prescriptive analytics involves providing recommendations and decision support based on insights derived from descriptive and predictive analytics. d) The study of computer algorithms and data structures. 2 / 30 2. What activities are typically performed during the Design phase of the Software Development Life Cycle (SDLC)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Activities performed during the Design phase include architectural design, detailed design of system components, database design, user interface design, and creation of design documents and diagrams. d) The study of computer algorithms and data structures. 3 / 30 3. What are some applications of computer vision? a) Object detection, image classification, facial recognition, autonomous vehicles, medical imaging. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 4 / 30 4. What is the role of cybersecurity regulations in mitigating cybercrime risks and protecting digital assets? a) Cybersecurity regulations play a critical role in mitigating cybercrime risks and protecting digital assets by establishing legal requirements, standards, and guidelines for organizations to implement comprehensive cybersecurity measures, practices, and controls to safeguard sensitive information, prevent data breaches, and respond effectively to cyber threats and incidents, ensuring compliance with regulatory requirements, protecting consumer privacy, and enhancing cybersecurity resilience and readiness across industries and sectors. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is hacking? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) The unauthorized intrusion into a computer system or network with the intent to exploit vulnerabilities or gain access to restricted data or resources. d) A physical device used for user authentication. 6 / 30 6. Which programming language is commonly used for implementing deep learning algorithms? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Python is commonly used for implementing deep learning algorithms due to its extensive libraries and frameworks such as TensorFlow, PyTorch, and Keras. 7 / 30 7. How many kilobytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 8 / 30 8. What is the purpose of a Git commit message? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The purpose of a Git commit message is to provide a concise and descriptive summary of the changes made in a commit, helping developers and collaborators understand the purpose, scope, and impact of the changes and facilitating code review, collaboration, and project maintenance. 9 / 30 9. What is two-factor authentication (2FA)? a) A type of encryption algorithm. b) A password policy requiring users to change their passwords regularly. c) A security mechanism that requires users to provide two different authentication factors to verify their identity. d) A type of firewall. 10 / 30 10. How many bits are in a kilobyte (KB)? a) 8000 b) 8192 c) 10240 d) 102400 11 / 30 11. What is asymmetric encryption? a) An encryption method that uses different keys for encryption and decryption. b) An encryption method that uses the same key for both encryption and decryption. c) A type of encryption algorithm. d) A security mechanism used to protect against unauthorized access to computer systems. 12 / 30 12. Which technology is used to create immersive virtual experiences in Virtual Reality (VR)? a) Virtual Reality (VR) uses a combination of technologies such as head-mounted displays (HMDs), motion tracking sensors, haptic feedback devices, and immersive audio systems to create immersive virtual experiences. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What is robotics? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A field of AI and engineering that focuses on designing, building, and programming robots to perform tasks autonomously or semi-autonomously. d) The physical components of a computer system. 14 / 30 14. What are some examples of IoT devices? a) Smartphones, laptops, tablets, desktop computers. b) Sensors, actuators, smart thermostats, wearable fitness trackers, connected appliances. c) Sorting algorithms, searching algorithms, graph algorithms. d) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). 15 / 30 15. What is copyright? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 16 / 30 16. What is CPU architecture? a) The physical design and layout of a central processing unit (CPU). b) The process of executing instructions in a program. c) A type of programming language. d) The software used for managing computer hardware. 17 / 30 17. What are conditional statements? a) Statements that are executed in a specific sequence regardless of any conditions. b) Statements that control the flow of execution in a program based on specified conditions or criteria. c) Statements used for declaring variables in a program. d) The process of executing a program. 18 / 30 18. Which network component connects multiple networks together and forwards data packets between them based on IP addresses? a) Router b) Switch c) Modem d) Hub 19 / 30 19. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 20 / 30 20. What are some common applications of machine learning? a) Common applications of machine learning include predictive analytics, recommendation systems, natural language processing, computer vision, and autonomous vehicles. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 21 / 30 21. What is encryption? a) The process of hiding computer hardware from physical damage. b) The process of transforming plaintext data into ciphertext to make it unreadable to unauthorized users. c) The process of optimizing computer performance. d) The development of new computer technologies. 22 / 30 22. What is Google Sheets? a) A search engine developed by Google. b) A cloud-based spreadsheet software developed by Google for creating, organizing, and collaborating on spreadsheets online. c) An email service developed by Google. d) A social media platform developed by Google. 23 / 30 23. Which technology overlays digital content onto the real-world environment in Augmented Reality (AR)? a) Augmented Reality (AR) overlays digital content onto the real-world environment using technologies such as smartphones, tablets, AR glasses, and head-up displays (HUDs). b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 24 / 30 24. What are some potential applications of blockchain technology beyond cryptocurrencies? a) Supply chain management, voting systems, identity verification, intellectual property protection, healthcare records management. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. What are the primary functions of the Control Unit (CU)? a) To perform arithmetic and logical operations on data. b) To fetch instructions from memory, decode them, and execute them. c) To temporarily store data and instructions. d) To manage communication between the CPU and other components of the computer system. 26 / 30 26. What is Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Agile Development Methodology is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback throughout the development process. d) The study of computer algorithms and data structures. 27 / 30 27. What is an internet? a) A global network of interconnected computers and devices. b) A single computer system with multiple processing units. c) A local area network within a single building or campus. d) A protocol used for sending emails. 28 / 30 28. What is a UPS (Uninterruptible Power Supply)? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 29 / 30 29. What is Virtual Reality (VR)? a) Virtual Reality (VR) is a computer-generated simulation of an immersive, three-dimensional environment that users can interact with using specialized hardware such as headsets and controllers. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 30 / 30 30. What is autonomous navigation? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The ability of robots or vehicles to navigate and move in their environment without human intervention. d) The physical components of a computer system. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study