Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which network component is essential for connecting a computer to the internet over a DSL, cable, or fiber-optic connection? a) Router b) Switch c) Modem d) Hub 2 / 30 2. What are some potential applications of blockchain technology beyond cryptocurrencies? a) Supply chain management, voting systems, identity verification, intellectual property protection, healthcare records management. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 3 / 30 3. What is an optical disc drive (ODD)? a) A storage device located inside the computer case used for storing data. b) A software application used for managing computer hardware. c) A device that uses laser technology to read and write data on optical discs, such as CDs, DVDs, and Blu-ray discs. d) A type of external hard drive. 4 / 30 4. How many bytes are in a gigabyte (GB)? a) 1000 b) 1024 c) 2048 d) 4096 5 / 30 5. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 6 / 30 6. Which technology is used to create immersive virtual experiences in Virtual Reality (VR)? a) Virtual Reality (VR) uses a combination of technologies such as head-mounted displays (HMDs), motion tracking sensors, haptic feedback devices, and immersive audio systems to create immersive virtual experiences. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. What is the World Wide Web (WWW)? a) A network of interconnected websites and web pages. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 8 / 30 8. What is flowchart? a) A programming language used for writing code. b) A type of malware. c) A visual representation of the sequence of steps and decision points in an algorithm or process, using symbols and arrows to depict the flow of control. d) The process of executing a program. 9 / 30 9. Why is ethics important in computing? a) To ensure compliance with legal regulations and industry standards. b) To prevent unethical behavior and harmful consequences in the use and development of computer technology. c) To improve the efficiency and performance of computer systems. d) To enhance the aesthetics and user experience of software applications. 10 / 30 10. What is feature engineering in machine learning? a) Feature engineering is the process of selecting, transforming, or creating new features from raw data to improve the performance of machine learning models. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 11 / 30 11. How many bytes are in a kilobyte (KB)? a) 100 b) 1024 c) 2048 d) 4096 12 / 30 12. What role does the Scrum Master play in Scrum, an Agile methodology? a) The Scrum Master is responsible for facilitating the Scrum process, coaching the development team on Agile principles and practices, removing impediments, and fostering a culture of continuous improvement. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. Which network component is responsible for determining the best path for data packets to reach their destination across multiple networks? a) Router b) Switch c) Modem d) Hub 14 / 30 14. Which network topology connects all devices to a central hub or switch? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 15 / 30 15. What are some examples of IoT applications in agriculture? a) Precision agriculture, crop monitoring, livestock tracking, automated irrigation systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 16 / 30 16. What are some challenges of blockchain technology? a) Scalability, interoperability, regulatory uncertainty, energy consumption, privacy concerns. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. What are some ethical considerations in the development of artificial intelligence (AI) systems? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Some ethical considerations in the development of artificial intelligence (AI) systems include transparency and explainability, fairness and bias mitigation, accountability and responsibility, privacy and data protection, and societal impact and human welfare. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. Which type of network uses wireless communication technologies to connect devices within a limited area, such as a home or office building? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 19 / 30 19. What are speakers? a) Devices used for capturing images and videos of scenes or individuals. b) Devices used for scanning printed text and converting it into digital format. c) Devices used for producing audio output, such as music, sound effects, and voice recordings. d) Devices used for controlling video games and simulations. 20 / 30 20. What are the advantages of using R for machine learning? a) The advantages of using R for machine learning include powerful statistical capabilities, extensive libraries, interactive visualization, and a vibrant community of users and developers. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 21 / 30 21. What is encryption? a) The process of hiding computer hardware from physical damage. b) The process of transforming plaintext data into ciphertext to make it unreadable to unauthorized users. c) The process of optimizing computer performance. d) The development of new computer technologies. 22 / 30 22. What are some examples of AI applications? a) Natural language processing, computer vision, robotics, autonomous vehicles, virtual assistants. b) Software development, data analysis, network administration, cloud computing. c) Hardware manufacturing, system integration, network infrastructure deployment. d) Graphic design, web development, multimedia production, user interface design. 23 / 30 23. How many bytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 24 / 30 24. What is Microsoft Excel? a) A type of antivirus software. b) A web browser developed by Microsoft. c) Spreadsheet software developed by Microsoft for creating, organizing, and analyzing data in tabular form. d) A social media platform developed by Microsoft. 25 / 30 25. What is a web page? a) A physical device used to connect computers to the internet. b) A single document displayed in a web browser. c) A software application used for communication between computers. d) A collection of interconnected websites. 26 / 30 26. What is descriptive analytics in data analytics? a) Descriptive analytics involves summarizing and visualizing data to understand historical trends, patterns, and relationships. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 27 / 30 27. Which type of network is designed to connect devices within a specific metropolitan area, such as a city or town? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 28 / 30 28. What is prescriptive analytics in data analytics? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Prescriptive analytics involves providing recommendations and decision support based on insights derived from descriptive and predictive analytics. d) The study of computer algorithms and data structures. 29 / 30 29. What is the binary representation of the decimal number 63? a) 110011 b) 111111 c) 100101 d) 101011 30 / 30 30. Which type of network is commonly used to provide internet access to users within a home or office environment? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study