Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is a denial-of-service (DoS) attack? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) An attack that floods a computer system or network with excessive traffic or requests, rendering it unavailable to legitimate users. d) A program that self-replicates and spreads by inserting copies of itself into other programs or files. 2 / 30 2. What are some examples of IoT applications in smart cities? a) Smart transportation systems, intelligent energy management, waste management, environmental monitoring, public safety. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 3 / 30 3. Which network component operates at the Physical layer of the OSI model and simply repeats incoming signals to all connected devices? a) Router b) Switch c) Modem d) Hub 4 / 30 4. What is a smart contract in blockchain technology? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Self-executing contracts with the terms of the agreement written in code, automatically enforced and executed when predefined conditions are met. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Self-executing contracts with the terms of the agreement written in code, automatically enforced and executed when predefined conditions are met. 5 / 30 5. What is the significance of data analytics in IoT? a) Data analytics involves analyzing and interpreting data collected from IoT devices to derive insights, identify patterns, and make informed decisions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 6 / 30 6. Which type of network is commonly used to provide internet access to users within a home or office environment? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 7 / 30 7. What is Google Docs? a) A search engine developed by Google. b) A cloud-based word processing software developed by Google for creating, editing, and sharing documents online. c) An email service developed by Google. d) A social media platform developed by Google. 8 / 30 8. What is Machine Learning (ML)? a) The study of computer algorithms and data structures. b) The process of securely storing data on computer systems. c) A subset of AI that focuses on developing algorithms that enable computers to learn from data and improve over time without explicit programming. d) The physical components of a computer system. 9 / 30 9. Which network topology connects all devices to a central hub or switch? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 10 / 30 10. What is sequence control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 11 / 30 11. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 12 / 30 12. What are some advantages of optical disc drives? a) Long-term data retention, compatibility with a wide range of devices, and low cost. b) Portable, easy to connect, and offer high storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 13 / 30 13. Which network device operates at the Physical layer of the OSI model and forwards data packets between different network segments? a) Hub b) Switch c) Router d) Bridge 14 / 30 14. How many megabytes are in a terabyte (TB)? a) 1,024 b) 1,048,576 c) 1,073,741,824 d) 1,099,511,627,776 15 / 30 15. What are some advantages of external hard drives? a) Portable, easy to connect, and offer high storage capacity. b) Fixed in place, difficult to connect, and offer limited storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 16 / 30 16. What role does the Scrum Master play in Scrum, an Agile methodology? a) The Scrum Master is responsible for facilitating the Scrum process, coaching the development team on Agile principles and practices, removing impediments, and fostering a culture of continuous improvement. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. What is reinforcement learning in machine learning? a) Reinforcement learning is a type of machine learning where the algorithm learns through trial and error by interacting with an environment, receiving feedback or rewards based on its actions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 18 / 30 18. What are some examples of AI applications? a) Natural language processing, computer vision, robotics, autonomous vehicles, virtual assistants. b) Software development, data analysis, network administration, cloud computing. c) Hardware manufacturing, system integration, network infrastructure deployment. d) Graphic design, web development, multimedia production, user interface design. 19 / 30 19. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 20 / 30 20. What is two-factor authentication (2FA)? a) A type of encryption algorithm. b) A password policy requiring users to change their passwords regularly. c) A security mechanism that requires users to provide two different authentication factors to verify their identity. d) A type of firewall. 21 / 30 21. What are some examples of IoT devices? a) Smartphones, laptops, tablets, desktop computers. b) Sensors, actuators, smart thermostats, wearable fitness trackers, connected appliances. c) Sorting algorithms, searching algorithms, graph algorithms. d) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). 22 / 30 22. What are some common uses of projectors? a) Presentations, lectures, movie screenings, digital signage. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Video conferencing, live streaming, online gaming. 23 / 30 23. What is robotics? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A field of AI and engineering that focuses on designing, building, and programming robots to perform tasks autonomously or semi-autonomously. d) The physical components of a computer system. 24 / 30 24. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 25 / 30 25. What are the advantages of Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) The advantages of Agile Development Methodology include increased flexibility, faster time-to-market, improved customer satisfaction, better quality software, and enhanced team collaboration and morale. d) The study of computer algorithms and data structures. 26 / 30 26. What are algorithms? a) Step-by-step procedures or instructions for solving a problem or accomplishing a task. b) Physical components of a computer system. c) Programming languages used for writing code. d) The process of executing a program. 27 / 30 27. What is natural language processing (NLP)? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A subset of AI that focuses on understanding and generating human language. d) The physical components of a computer system. 28 / 30 28. What is a projector? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for displaying visual content, such as images and videos, on a large screen or surface. d) A device used for controlling video games and simulations. 29 / 30 29. What are some key principles of privacy protection in the context of cybersecurity regulations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some key principles of privacy protection in the context of cybersecurity regulations include data minimization, consent and user control, transparency and accountability, security safeguards and encryption, data breach notification, and cross-border data transfers. 30 / 30 30. Which network component is essential for connecting a computer to the internet over a DSL, cable, or fiber-optic connection? a) Router b) Switch c) Modem d) Hub Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study