Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which type of memory is volatile and used for temporary storage of data and program instructions during the operation of a computer? a) RAM b) ROM c) Cache Memory d) Virtual Memory 2 / 30 2. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 3 / 30 3. What is natural language processing (NLP)? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A subset of AI that focuses on understanding and generating human language. d) The physical components of a computer system. 4 / 30 4. What is a Git repository, and how is it used in version control? a) A Git repository is a data structure that stores metadata and content related to a project, including source code files, commit history, branches, and configuration settings, providing a centralized location for version control operations such as tracking changes, branching, merging, and collaboration. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is a web page? a) A physical device used to connect computers to the internet. b) A single document displayed in a web browser. c) A software application used for communication between computers. d) A collection of interconnected websites. 6 / 30 6. What are the benefits of IoT? a) Improved efficiency, increased convenience, enhanced decision-making, automation of tasks, new business opportunities. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. How many bytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 8 / 30 8. What is data analytics? a) Data analytics is the process of analyzing, interpreting, and visualizing data to extract actionable insights and make informed decisions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 9 / 30 9. What is sequence control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 10 / 30 10. Which type of network is typically managed and maintained by a single organization or entity for internal use? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 11 / 30 11. What is CPU architecture? a) The physical design and layout of a central processing unit (CPU). b) The process of executing instructions in a program. c) A type of programming language. d) The software used for managing computer hardware. 12 / 30 12. What is hacking? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) The unauthorized intrusion into a computer system or network with the intent to exploit vulnerabilities or gain access to restricted data or resources. d) A physical device used for user authentication. 13 / 30 13. Why is cybersecurity important? a) To ensure compliance with legal regulations and industry standards. b) To prevent unauthorized access, protect sensitive information, and safeguard against cyber threats. c) To improve the efficiency and performance of computer systems. d) To enhance the aesthetics and user experience of software applications. 14 / 30 14. What is a Merkle tree in blockchain technology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A data structure used to efficiently store and verify the integrity of transactions in a block by organizing them into a hierarchical tree structure of cryptographic hashes. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. Which type of network spans a large geographical area, often connecting multiple cities or even countries? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 16 / 30 16. Why is ethics important in computing? a) To ensure compliance with legal regulations and industry standards. b) To prevent unethical behavior and harmful consequences in the use and development of computer technology. c) To improve the efficiency and performance of computer systems. d) To enhance the aesthetics and user experience of software applications. 17 / 30 17. Which type of network covers a small geographical area, typically within a single building or campus? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 18 / 30 18. What are neural networks? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) A type of machine learning algorithm inspired by the structure and function of the human brain, consisting of interconnected nodes (neurons) organized in layers. 19 / 30 19. What are some key principles of privacy protection in the context of cybersecurity regulations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some key principles of privacy protection in the context of cybersecurity regulations include data minimization, consent and user control, transparency and accountability, security safeguards and encryption, data breach notification, and cross-border data transfers. 20 / 30 20. What is the role of data visualization in data analytics? a) Data visualization involves representing data visually through charts, graphs, and dashboards to facilitate understanding, interpretation, and communication of insights. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 21 / 30 21. Which type of memory retains its data even when the power is turned off and is commonly used to store BIOS firmware? a) RAM b) ROM c) Cache Memory d) Virtual Memory 22 / 30 22. What are some challenges of blockchain technology? a) Scalability, interoperability, regulatory uncertainty, energy consumption, privacy concerns. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 23 / 30 23. How many gigabytes are in a terabyte (TB)? a) 1000 b) 1024 c) 2048 d) 4096 24 / 30 24. Which type of network is suitable for connecting branch offices of a multinational corporation located in different countries? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 25 / 30 25. Which network topology connects each device in a linear sequence? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 26 / 30 26. What is graphics software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for word processing and document creation. c) Software used for managing computer networks and resources. d) Software used for playing multimedia files. 27 / 30 27. What is pseudocode? a) A programming language used for writing code. b) A type of malware. c) A high-level description of a computer program or algorithm using natural language and simple syntax. d) The process of executing a program. 28 / 30 28. Which of the following is NOT a type of optical disc? a) CD (Compact Disc) b) DVD (Digital Versatile Disc) c) SSD (Solid State Drive) d) Blu-ray Disc 29 / 30 29. What is model evaluation in machine learning? a) Model evaluation is the process of assessing the performance and generalization ability of machine learning models using evaluation metrics and validation techniques. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study