Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What activities are typically performed during the Maintenance phase of the Software Development Life Cycle (SDLC)? a) Activities performed during the Maintenance phase include bug fixing, enhancements, updates, optimizations, and ongoing support and maintenance to ensure the continued reliability, usability, and performance of the software system. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 2 / 30 2. What is the concept of tokenization in blockchain technology? a) Tokenization involves representing real-world assets or rights as digital tokens on a blockchain, enabling ownership, transfer, and trading in a decentralized manner. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 3 / 30 3. What is the role of cryptography in blockchain technology? a) Cryptography is used to secure transactions and data on the blockchain, ensuring confidentiality, integrity, and authenticity. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 4 / 30 4. What is the difference between descriptive and inferential statistics in data analytics? a) Descriptive statistics involve summarizing and describing the characteristics of a dataset, while inferential statistics involve making predictions or inferences about a population based on sample data. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What are registers in the memory hierarchy? a) The fastest and smallest type of computer memory located within the CPU. b) The largest and slowest type of computer memory used for long-term storage. c) A type of programming language. d) The software used for managing computer hardware. 6 / 30 6. What is a variable? a) A fixed value in a program that cannot be changed. b) A programming language used for writing code. c) A placeholder for storing data that can vary or change during the execution of a program. d) A type of malware. 7 / 30 7. What is Microsoft PowerPoint? a) A type of antivirus software. b) A web browser developed by Microsoft. c) Presentation software developed by Microsoft for creating and delivering slideshows. d) A social media platform developed by Microsoft. 8 / 30 8. What is Google Slides? a) A search engine developed by Google. b) A cloud-based presentation software developed by Google for creating and delivering slideshows online. c) An email service developed by Google. d) A social media platform developed by Google. 9 / 30 9. Which type of network spans a large geographical area, often connecting multiple cities or even countries? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 10 / 30 10. Which type of network uses wireless communication technologies to connect devices within a limited area, such as a home or office building? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 11 / 30 11. What is Microsoft Excel? a) A type of antivirus software. b) A web browser developed by Microsoft. c) Spreadsheet software developed by Microsoft for creating, organizing, and analyzing data in tabular form. d) A social media platform developed by Microsoft. 12 / 30 12. What is data preprocessing in data analytics? a) Data preprocessing involves cleaning, transforming, and integrating raw data to prepare it for analysis, ensuring data quality and consistency. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What are the advantages of Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) The advantages of Agile Development Methodology include increased flexibility, faster time-to-market, improved customer satisfaction, better quality software, and enhanced team collaboration and morale. d) The study of computer algorithms and data structures. 14 / 30 14. What is a domain? a) The physical location of a website's server. b) The unique address used to access a website on the internet. c) The software used to host a website. d) The company that owns a website. 15 / 30 15. Which type of network is designed to connect devices within a specific metropolitan area, such as a city or town? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 16 / 30 16. How many megabytes are in a terabyte (TB)? a) 1,024 b) 1,048,576 c) 1,073,741,824 d) 1,099,511,627,776 17 / 30 17. What is computer security? a) The protection of computer hardware from physical damage. b) The prevention of unauthorized access to computer systems and data. c) The process of optimizing computer performance. d) The development of new computer technologies. 18 / 30 18. What are the primary functions of the Control Unit (CU)? a) To perform arithmetic and logical operations on data. b) To fetch instructions from memory, decode them, and execute them. c) To temporarily store data and instructions. d) To manage communication between the CPU and other components of the computer system. 19 / 30 19. What is a website? a) A physical device used to connect computers to the internet. b) A collection of networked computers sharing resources. c) A software application used for communication between computers. d) A collection of web pages accessible via the World Wide Web. 20 / 30 20. What role does the Scrum Master play in Scrum, an Agile methodology? a) The Scrum Master is responsible for facilitating the Scrum process, coaching the development team on Agile principles and practices, removing impediments, and fostering a culture of continuous improvement. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 21 / 30 21. What is overfitting in machine learning? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Overfitting occurs when a machine learning model learns to capture noise or random fluctuations in the training data, resulting in poor generalization to new, unseen data. d) The study of computer algorithms and data structures. 22 / 30 22. What is a surge protector? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges by regulating voltage levels. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 23 / 30 23. What is a Git branch, and how is it used in version control? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A Git branch is a lightweight movable pointer to a commit in the commit history, representing an independent line of development with its own set of changes and history, enabling parallel development, isolation of changes, and experimentation without affecting the main codebase. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 24 / 30 24. What is the Turing Test? a) A test used to evaluate the intelligence of a machine by assessing its ability to exhibit behavior indistinguishable from that of a human. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. What are some features of Google Docs? a) Real-time collaboration, automatic saving, and version history. b) Video editing and graphic design tools. c) Web browsing and email functionality. d) Gaming and entertainment features. 26 / 30 26. What are the key roles in Scrum, an Agile methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The key roles in Scrum include the Product Owner, Scrum Master, and Development Team, each with distinct responsibilities and contributions to the Agile development process. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. Why is ethics important in the field of computing? a) Ethics is important in computing to ensure that technology is developed, used, and managed in a responsible, ethical, and socially acceptable manner, considering the impact on individuals, society, and the environment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 28 / 30 28. What are some common cybercrime threats and attacks targeting individuals and organizations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some common cybercrime threats and attacks targeting individuals and organizations include malware infections, phishing scams, ransomware attacks, data breaches, identity theft, financial fraud, social engineering exploits, insider threats, denial-of-service (DoS) attacks, and supply chain vulnerabilities. 29 / 30 29. What is unsupervised learning? a) Learning from labeled data with input-output pairs to make predictions or classifications. b) Learning from unlabeled data to discover patterns or structures. c) Learning through interaction with an environment to maximize rewards. d) The study of computer algorithms and data structures. 30 / 30 30. What are some popular programming languages used in machine learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some popular programming languages used in machine learning include Python, R, Java, and Julia. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study