Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What are some common data preprocessing techniques? a) Common data preprocessing techniques include data cleaning, data transformation, feature engineering, and dimensionality reduction. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 2 / 30 2. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 3 / 30 3. What is a virus? a) A type of encryption algorithm. b) A program that self-replicates and spreads by inserting copies of itself into other programs or files. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 4 / 30 4. What are the different types of databases supported by DBMS? a) Relational databases, NoSQL databases, object-oriented databases, hierarchical databases. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is the binary representation of the decimal number 15? a) 1111 b) 1010 c) 1101 d) 1001 6 / 30 6. What are neural networks? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) A type of machine learning algorithm inspired by the structure and function of the human brain, consisting of interconnected nodes (neurons) organized in layers. 7 / 30 7. What is the main advantage of using cloud-based word processing software like Google Docs? a) Offline access to documents. b) Real-time collaboration and sharing of documents with others. c) Advanced formatting and design options. d) Integration with desktop applications. 8 / 30 8. What are the key differences between copyright, patent, and trademark as forms of intellectual property protection? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Copyright protects original works of authorship, such as literary, artistic, and musical creations, providing creators with exclusive rights to reproduce, distribute, perform, and display their works, while patents protect inventions, innovations, and technological advancements, granting inventors exclusive rights to exploit, manufacture, and commercialize their inventions for a limited period, and trademarks protect brands, logos, and symbols used to distinguish goods and services in the marketplace, providing owners with exclusive rights to use, license, and protect their distinctive marks from unauthorized use or infringement by others. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 9 / 30 9. What is a Git merge, and how does it work in version control? a) Git merge is a version control operation that combines changes from one branch into another, integrating new features, bug fixes, or changes made in a feature branch back into the main branch or another target branch, preserving the commit history and resolving conflicts if necessary. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 10 / 30 10. Which type of network is suitable for connecting branch offices of a multinational corporation located in different countries? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 11 / 30 11. What are some challenges of IoT? a) Security and privacy concerns, interoperability issues, scalability challenges, data management complexities, regulatory compliance. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. What is blockchain technology? a) A decentralized digital ledger that records transactions across multiple computers in a way that is transparent, secure, and immutable. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What is a cooling pad? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 14 / 30 14. What is an external hard drive? a) A storage device located inside the computer case used for storing data. b) A software application used for managing computer hardware. c) A device connected to a computer externally for storing data, typically using a USB or Thunderbolt interface. d) A type of optical disc used for storing data. 15 / 30 15. What is a password? a) A physical device used for user authentication. b) A secret combination of characters used for user authentication to access a computer system or account. c) A type of encryption algorithm. d) A type of malware. 16 / 30 16. What is the role of consensus mechanisms in blockchain? a) Consensus mechanisms are protocols or algorithms used to achieve agreement among nodes in a decentralized network regarding the validity of transactions and the state of the blockchain. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 17 / 30 17. How many bits are in a kilobyte (KB)? a) 8000 b) 8192 c) 10240 d) 102400 18 / 30 18. What are the main types of machine learning? a) The main types of machine learning are supervised learning, unsupervised learning, and reinforcement learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 19 / 30 19. What are some advantages of optical disc drives? a) Long-term data retention, compatibility with a wide range of devices, and low cost. b) Portable, easy to connect, and offer high storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 20 / 30 20. What are some common cybercrime threats and attacks targeting individuals and organizations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some common cybercrime threats and attacks targeting individuals and organizations include malware infections, phishing scams, ransomware attacks, data breaches, identity theft, financial fraud, social engineering exploits, insider threats, denial-of-service (DoS) attacks, and supply chain vulnerabilities. 21 / 30 21. Which network component connects multiple networks together and forwards data packets between them based on IP addresses? a) Router b) Switch c) Modem d) Hub 22 / 30 22. What is a Trojan horse? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware disguised as legitimate software that appears harmless but contains malicious code that performs unauthorized actions when executed. 23 / 30 23. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 24 / 30 24. What are some common applications of Virtual Reality (VR)? a) Common applications of Virtual Reality (VR) include gaming, simulations, training and education, virtual tours, healthcare, and architectural visualization. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. Which type of network is typically managed and maintained by a single organization or entity for internal use? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 26 / 30 26. Which network topology connects all devices to a central hub or switch? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 27 / 30 27. What are some strategies for addressing biases and promoting fairness in artificial intelligence (AI) algorithms and decision-making systems? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some strategies for addressing biases and promoting fairness in artificial intelligence (AI) algorithms and decision-making systems include data preprocessing and cleaning, algorithmic fairness and bias mitigation techniques, diversity and inclusion in dataset collection and model training, transparency and explainability in AI systems, human oversight and accountability mechanisms, and ongoing monitoring and evaluation of AI systems for bias detection and correction. 28 / 30 28. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 29 / 30 29. What is a Git repository, and how is it used in version control? a) A Git repository is a data structure that stores metadata and content related to a project, including source code files, commit history, branches, and configuration settings, providing a centralized location for version control operations such as tracking changes, branching, merging, and collaboration. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. Which type of memory is typically faster than secondary storage but slower than cache memory and main memory? a) RAM b) ROM c) Cache Memory d) Virtual Memory Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study