Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is a game controller? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for controlling video games and simulations. d) A device used for storing data externally. 2 / 30 2. What is robotics? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A field of AI and engineering that focuses on designing, building, and programming robots to perform tasks autonomously or semi-autonomously. d) The physical components of a computer system. 3 / 30 3. What are the key benefits of using a Version Control System (VCS) in software development? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The key benefits of using a Version Control System (VCS) include versioning and history tracking, collaboration and team coordination, conflict resolution, backup and disaster recovery, and code quality and stability. 4 / 30 4. What are some benefits of using cooling pads? a) Reduced risk of overheating, improved system stability, extended lifespan of laptop components. b) Enhanced network connectivity, faster data transfer rates, improved graphics performance. c) Increased storage capacity, reduced system boot time, enhanced security features. d) Improved sound quality, faster processing speeds, better image resolution. 5 / 30 5. What is intellectual property? a) The physical components of a computer system. b) Software applications used for managing computer hardware. c) The rights granted to individuals or organizations to control the use and distribution of their creative works, inventions, and discoveries. d) The study of computer algorithms and data structures. 6 / 30 6. What is the role of connectivity in IoT? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Connectivity enables IoT devices to exchange data and communicate with each other and the internet, forming a networked ecosystem. 7 / 30 7. How does blockchain achieve decentralization? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) By distributing transaction data across multiple computers (nodes) in a network, eliminating the need for a central authority or intermediary. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 8 / 30 8. Which network device operates at the Physical layer of the OSI model and simply repeats incoming electrical signals to all connected devices? a) Hub b) Switch c) Router d) Bridge 9 / 30 9. What is the primary goal of the Requirements Analysis phase in the Software Development Life Cycle (SDLC)? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The primary goal of the Requirements Analysis phase is to gather and document the functional and non-functional requirements of the software system, ensuring a clear understanding of the project scope and objectives. 10 / 30 10. What is accessibility in computing? a) The protection of personal information and data from unauthorized access or disclosure. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) The design and implementation of technology to ensure equal access and usability for individuals with disabilities. 11 / 30 11. What is a URL? a) A unique identifier for a website. b) A software application used for communication between computers. c) A protocol used for sending emails. d) A web address that specifies the location of a web page on the internet. 12 / 30 12. Which network topology connects devices in a closed loop, where each device is connected to exactly two other devices? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 13 / 30 13. Which type of network is commonly used in homes, schools, and small businesses to connect devices within a limited area? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 14 / 30 14. Which network component connects multiple networks together and forwards data packets between them based on IP addresses? a) Router b) Switch c) Modem d) Hub 15 / 30 15. What are some common uses of speakers? a) Video conferencing, live streaming, online gaming. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Listening to music, watching movies, playing video games. 16 / 30 16. What are the key principles of Agile Development Methodology? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The key principles of Agile Development Methodology include customer collaboration, responding to change, delivering working software, self-organizing teams, and regular reflection and adaptation. 17 / 30 17. What are external storage devices? a) Hardware components inside the computer case used for storing data. b) Software applications used for managing computer hardware. c) Devices connected to a computer externally for storing data outside of the computer's internal storage. d) Peripheral devices used for input and output operations. 18 / 30 18. What is a cryptocurrency in the context of blockchain? a) Digital or virtual currencies that use cryptography for secure transactions and operate on decentralized blockchain networks. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 19 / 30 19. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 20 / 30 20. How many gigabytes are in a terabyte (TB)? a) 1000 b) 1024 c) 2048 d) 4096 21 / 30 21. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 22 / 30 22. What are some advantages of optical disc drives? a) Long-term data retention, compatibility with a wide range of devices, and low cost. b) Portable, easy to connect, and offer high storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 23 / 30 23. Which type of network covers a small geographical area, typically within a single building or campus? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 24 / 30 24. What is the future of machine learning programming languages? a) The future of machine learning programming languages is expected to involve continued innovation, development of specialized languages and tools, and integration with emerging technologies such as quantum computing and edge computing. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. What is malware? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 26 / 30 26. What is a patent? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 27 / 30 27. What is Machine Learning (ML)? a) The study of computer algorithms and data structures. b) The process of securely storing data on computer systems. c) A subset of AI that focuses on developing algorithms that enable computers to learn from data and improve over time without explicit programming. d) The physical components of a computer system. 28 / 30 28. Which type of network uses wireless communication technologies to connect devices within a limited area, such as a home or office building? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 29 / 30 29. What is a Git repository, and how is it used in version control? a) A Git repository is a data structure that stores metadata and content related to a project, including source code files, commit history, branches, and configuration settings, providing a centralized location for version control operations such as tracking changes, branching, merging, and collaboration. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. What is blockchain technology? a) A decentralized digital ledger that records transactions across multiple computers in a way that is transparent, secure, and immutable. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score isShare your achievement! LinkedIn Facebook 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study