Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is hypothesis testing in data analytics? a) Hypothesis testing is a statistical method used to make inferences about population parameters based on sample data, allowing analysts to test hypotheses and draw conclusions about relationships or differences between variables. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 2 / 30 2. What is security in computing? a) The process of securely storing data on computer systems. b) The protection of computer systems and data from threats, such as viruses, hackers, and cyber attacks. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 3 / 30 3. What is a blockchain fork? a) A blockchain fork occurs when a blockchain splits into two separate chains due to a change in the consensus rules or disagreement among participants. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 4 / 30 4. What are the different types of databases supported by DBMS? a) Relational databases, NoSQL databases, object-oriented databases, hierarchical databases. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is exploratory data analysis (EDA) in data analytics? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Exploratory data analysis (EDA) involves exploring and visualizing data to gain insights, identify patterns, and formulate hypotheses for further analysis. 6 / 30 6. What is the role of R in machine learning? a) R is a programming language and environment for statistical computing and graphics, commonly used for data analysis, visualization, and statistical modeling in machine learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 7 / 30 7. What are the main types of machine learning? a) The main types of machine learning are supervised learning, unsupervised learning, and reinforcement learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 8 / 30 8. What is the main advantage of using cloud-based spreadsheet software like Google Sheets? a) Offline access to spreadsheets. b) Real-time collaboration and sharing of spreadsheets with others. c) Advanced data analysis tools. d) Integration with desktop applications. 9 / 30 9. What is Augmented Reality (AR)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Augmented Reality (AR) is a technology that overlays digital content and information onto the real-world environment, enhancing the user's perception and interaction with their surroundings. d) The study of computer algorithms and data structures. 10 / 30 10. Which network topology provides redundant paths between devices, offering increased reliability and fault tolerance? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 11 / 30 11. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 12 / 30 12. How many megabytes are in a terabyte (TB)? a) 1,024 b) 1,048,576 c) 1,073,741,824 d) 1,099,511,627,776 13 / 30 13. What is video editing software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for playing multimedia files, such as audio and video. c) Software used for managing computer networks and resources. d) Software used for editing and enhancing video recordings. 14 / 30 14. What is a hyperlink? a) A type of network topology. b) A clickable element on a web page that redirects to another web page or resource. c) A protocol used for sending emails. d) A physical device used to connect computers to the internet. 15 / 30 15. Which network component operates at the Data Link layer of the OSI model and forwards data packets within the same network segment based on MAC addresses? a) Router b) Switch c) Modem d) Hub 16 / 30 16. What are some common data preprocessing techniques? a) Common data preprocessing techniques include data cleaning, data transformation, feature engineering, and dimensionality reduction. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 17 / 30 17. What are some benefits of using cooling pads? a) Reduced risk of overheating, improved system stability, extended lifespan of laptop components. b) Enhanced network connectivity, faster data transfer rates, improved graphics performance. c) Increased storage capacity, reduced system boot time, enhanced security features. d) Improved sound quality, faster processing speeds, better image resolution. 18 / 30 18. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 19 / 30 19. What is the Internet? a) A global network of interconnected computers and devices. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 20 / 30 20. What is the purpose of a Git commit message? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The purpose of a Git commit message is to provide a concise and descriptive summary of the changes made in a commit, helping developers and collaborators understand the purpose, scope, and impact of the changes and facilitating code review, collaboration, and project maintenance. 21 / 30 21. Which network device operates at the Physical layer of the OSI model and forwards data packets between different network segments? a) Hub b) Switch c) Router d) Bridge 22 / 30 22. How many bits are in a kilobyte (KB)? a) 8000 b) 8192 c) 10240 d) 102400 23 / 30 23. Which type of network uses wireless communication technologies to connect devices within a limited area, such as a home or office building? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 24 / 30 24. What is a variable? a) A fixed value in a program that cannot be changed. b) A programming language used for writing code. c) A placeholder for storing data that can vary or change during the execution of a program. d) A type of malware. 25 / 30 25. What is Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Agile Development Methodology is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback throughout the development process. d) The study of computer algorithms and data structures. 26 / 30 26. What are some common applications of Augmented Reality (AR)? a) Common applications of Augmented Reality (AR) include mobile apps, gaming, retail, advertising, navigation, industrial training, and healthcare. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What is SVN (Subversion), and how does it differ from Git? a) SVN (Subversion) is a centralized version control system (CVCS) that uses a central repository to store project history, requiring developers to be online to access and commit changes, while Git is a distributed version control system (DVCS) that allows each developer to have a complete copy of the repository on their local machine, enabling offline and independent work. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 28 / 30 28. What are some common cybercrime threats and attacks targeting individuals and organizations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some common cybercrime threats and attacks targeting individuals and organizations include malware infections, phishing scams, ransomware attacks, data breaches, identity theft, financial fraud, social engineering exploits, insider threats, denial-of-service (DoS) attacks, and supply chain vulnerabilities. 29 / 30 29. What are input devices? a) Devices used for outputting data from a computer system. b) Devices used for connecting to a network. c) Devices used for entering data and commands into a computer system. d) Devices used for storing data externally. 30 / 30 30. Which type of network is commonly used in homes, schools, and small businesses to connect devices within a limited area? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study