Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which type of network may utilize technologies such as leased lines, fiber optics, and satellite links for long-distance communication? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 2 / 30 2. What is Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Agile Development Methodology is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback throughout the development process. d) The study of computer algorithms and data structures. 3 / 30 3. What activities are typically performed during the Maintenance phase of the Software Development Life Cycle (SDLC)? a) Activities performed during the Maintenance phase include bug fixing, enhancements, updates, optimizations, and ongoing support and maintenance to ensure the continued reliability, usability, and performance of the software system. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 4 / 30 4. What is the purpose of a Git commit message? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The purpose of a Git commit message is to provide a concise and descriptive summary of the changes made in a commit, helping developers and collaborators understand the purpose, scope, and impact of the changes and facilitating code review, collaboration, and project maintenance. 5 / 30 5. How many bits are in a kilobyte (KB)? a) 8000 b) 8192 c) 10240 d) 102400 6 / 30 6. What is a Git remote, and how is it used in version control? a) A Git remote is a reference to a remote repository hosted on a server or another location, enabling developers to push and pull changes between local and remote repositories, collaborate with distributed teams, and synchronize project updates. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. What is the decimal equivalent of the binary number 11100? a) 20 b) 24 c) 28 d) 32 8 / 30 8. What is asymmetric encryption? a) An encryption method that uses different keys for encryption and decryption. b) An encryption method that uses the same key for both encryption and decryption. c) A type of encryption algorithm. d) A security mechanism used to protect against unauthorized access to computer systems. 9 / 30 9. What are some ethical considerations in the development and deployment of facial recognition technology? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some ethical considerations in the development and deployment of facial recognition technology include privacy and surveillance concerns, accuracy and bias issues, consent and transparency requirements, security and misuse risks, and societal impact and human rights implications. 10 / 30 10. What are the advantages of using R for machine learning? a) The advantages of using R for machine learning include powerful statistical capabilities, extensive libraries, interactive visualization, and a vibrant community of users and developers. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 11 / 30 11. What types of identifiers can be protected as trademarks? a) Words, logos, symbols, slogans, or combinations thereof used to represent goods or services in commerce. b) New and useful inventions, processes, methods, or compositions of matter. c) Literary works, artistic works, musical works, dramatic works, and other creative expressions. d) Ideas, concepts, facts, and theories. 12 / 30 12. What are some common algorithms used in unsupervised learning? a) Common algorithms used in unsupervised learning include k-means clustering, hierarchical clustering, principal component analysis (PCA), and autoencoders. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 13 / 30 13. What are some popular programming languages used in machine learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some popular programming languages used in machine learning include Python, R, Java, and Julia. 14 / 30 14. What is the main advantage of using cloud-based spreadsheet software like Google Sheets? a) Offline access to spreadsheets. b) Real-time collaboration and sharing of spreadsheets with others. c) Advanced data analysis tools. d) Integration with desktop applications. 15 / 30 15. What is unsupervised learning? a) Learning from labeled data with input-output pairs to make predictions or classifications. b) Learning from unlabeled data to discover patterns or structures. c) Learning through interaction with an environment to maximize rewards. d) The study of computer algorithms and data structures. 16 / 30 16. What are some examples of graphics software? a) Adobe Photoshop, Adobe Illustrator, CorelDRAW. b) Microsoft Word, Google Docs, Microsoft Excel. c) Windows Media Player, VLC Media Player, QuickTime Player. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 17 / 30 17. What is feature engineering in machine learning? a) Feature engineering is the process of selecting, transforming, or creating new features from raw data to improve the performance of machine learning models. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 18 / 30 18. What is a cooling pad? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 19 / 30 19. What are some ethical considerations in computing? a) Privacy, security, intellectual property rights, accessibility. b) Processor speed, memory capacity, storage capacity, network bandwidth. c) Operating system compatibility, software licensing, hardware maintenance. d) User interface design, graphic design, multimedia integration, web development. 20 / 30 20. What is encryption? a) The process of hiding computer hardware from physical damage. b) The process of transforming plaintext data into ciphertext to make it unreadable to unauthorized users. c) The process of optimizing computer performance. d) The development of new computer technologies. 21 / 30 21. Which type of memory is used to expand the effective size of the main memory by using a portion of the hard disk as an extension? a) RAM b) ROM c) Cache Memory d) Virtual Memory 22 / 30 22. What is the future of machine learning programming languages? a) The future of machine learning programming languages is expected to involve continued innovation, development of specialized languages and tools, and integration with emerging technologies such as quantum computing and edge computing. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 23 / 30 23. How many bits are in a byte? a) 4 b) 8 c) 16 d) 32 24 / 30 24. What are external storage devices? a) Hardware components inside the computer case used for storing data. b) Software applications used for managing computer hardware. c) Devices connected to a computer externally for storing data outside of the computer's internal storage. d) Peripheral devices used for input and output operations. 25 / 30 25. What are some common types of game controllers? a) Gamepads, joysticks, steering wheels, motion controllers. b) Keyboards, mice, touchpads, styluses. c) Webcams, scanners, printers, microphones. d) Monitors, speakers, headphones, projectors. 26 / 30 26. What is the purpose of a Change Log or Release Notes in software development? a) The purpose of a Change Log or Release Notes is to document the changes, enhancements, bug fixes, and new features introduced in each version or release of the software, providing users, developers, and stakeholders with an overview of the changes and improvements made over time. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What are the components of a typical DBMS architecture? a) The components of a typical DBMS architecture include the database engine, data storage, query processor, transaction manager, and user interface. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 28 / 30 28. Which network topology provides redundant paths between devices, offering increased reliability and fault tolerance? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 29 / 30 29. What is the main advantage of using cloud-based word processing software like Google Docs? a) Offline access to documents. b) Real-time collaboration and sharing of documents with others. c) Advanced formatting and design options. d) Integration with desktop applications. 30 / 30 30. What are some advantages of optical disc drives? a) Long-term data retention, compatibility with a wide range of devices, and low cost. b) Portable, easy to connect, and offer high storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study