Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is blockchain technology? a) A decentralized digital ledger that records transactions across multiple computers in a way that is transparent, secure, and immutable. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 2 / 30 2. What is the goal of AI in robotics? a) To create robots that can perform tasks more efficiently and effectively than humans. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) To develop robots with human-like intelligence and consciousness. 3 / 30 3. What are some key principles of privacy protection in the context of cybersecurity regulations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some key principles of privacy protection in the context of cybersecurity regulations include data minimization, consent and user control, transparency and accountability, security safeguards and encryption, data breach notification, and cross-border data transfers. 4 / 30 4. What is a webcam? a) A device used for capturing images and videos of physical documents. b) A device used for scanning printed text and converting it into digital format. c) A device used for capturing images and videos of scenes or individuals, typically for video conferencing or streaming. d) A device used for controlling video games and simulations. 5 / 30 5. What is the purpose of the Testing phase in the Software Development Life Cycle (SDLC)? a) The purpose of the Testing phase is to verify and validate the software system against the specified requirements, ensuring that it meets quality standards, is free of defects, and performs as expected under various conditions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 6 / 30 6. What is the Turing Test? a) A test used to evaluate the intelligence of a machine by assessing its ability to exhibit behavior indistinguishable from that of a human. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. What are output devices? a) Devices used for storing data externally. b) Devices used for connecting to a network. c) Devices used for displaying or presenting data or information generated by a computer system. d) Devices used for entering data and commands into a computer system. 8 / 30 8. What are some common algorithms used in supervised learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Common algorithms used in supervised learning include linear regression, logistic regression, decision trees, random forests, support vector machines (SVM), and neural networks. 9 / 30 9. Which type of network is typically managed and maintained by a single organization or entity for internal use? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 10 / 30 10. How many bytes are in a gigabyte (GB)? a) 1000 b) 1024 c) 2048 d) 4096 11 / 30 11. Which type of network is designed to connect devices within a specific metropolitan area, such as a city or town? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 12 / 30 12. What are some applications of computer vision? a) Object detection, image classification, facial recognition, autonomous vehicles, medical imaging. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What is a URL? a) A unique identifier for a website. b) A software application used for communication between computers. c) A protocol used for sending emails. d) A web address that specifies the location of a web page on the internet. 14 / 30 14. What is main memory in the memory hierarchy? a) The fastest and smallest type of computer memory located within the CPU. b) The largest and slowest type of computer memory used for long-term storage. c) A type of programming language. d) The software used for managing computer hardware. 15 / 30 15. What are some features of Google Docs? a) Real-time collaboration, automatic saving, and version history. b) Video editing and graphic design tools. c) Web browsing and email functionality. d) Gaming and entertainment features. 16 / 30 16. What are some applications of robotics? a) Industrial automation, healthcare assistance, agriculture, exploration, entertainment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. What role does the Product Owner play in Agile Development Methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The Product Owner is responsible for representing the interests of the stakeholders, defining and prioritizing the product backlog, and ensuring that the development team delivers value to the customer. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. How many bytes are in a kilobyte (KB)? a) 100 b) 1024 c) 2048 d) 4096 19 / 30 19. What is the role of R in machine learning? a) R is a programming language and environment for statistical computing and graphics, commonly used for data analysis, visualization, and statistical modeling in machine learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 20 / 30 20. What is a computer network? a) A group of interconnected computers that share resources and information. b) A single computer system with multiple processing units. c) A software application used for communication between computers. d) A physical device used to connect computers to the internet. 21 / 30 21. What is a Git branch, and how is it used in version control? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A Git branch is a lightweight movable pointer to a commit in the commit history, representing an independent line of development with its own set of changes and history, enabling parallel development, isolation of changes, and experimentation without affecting the main codebase. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 22 / 30 22. What is prescriptive analytics in data analytics? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Prescriptive analytics involves providing recommendations and decision support based on insights derived from descriptive and predictive analytics. d) The study of computer algorithms and data structures. 23 / 30 23. Which network topology provides redundant paths between devices, offering increased reliability and fault tolerance? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 24 / 30 24. What is Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Agile Development Methodology is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback throughout the development process. d) The study of computer algorithms and data structures. 25 / 30 25. What is a variable? a) A fixed value in a program that cannot be changed. b) A programming language used for writing code. c) A placeholder for storing data that can vary or change during the execution of a program. d) A type of malware. 26 / 30 26. What are the advantages of using Python for machine learning? a) The advantages of using Python for machine learning include simplicity, readability, extensive libraries, community support, and integration with other technologies. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What is the primary goal of the Requirements Analysis phase in the Software Development Life Cycle (SDLC)? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The primary goal of the Requirements Analysis phase is to gather and document the functional and non-functional requirements of the software system, ensuring a clear understanding of the project scope and objectives. 28 / 30 28. What is encryption? a) The process of hiding computer hardware from physical damage. b) The process of transforming plaintext data into ciphertext to make it unreadable to unauthorized users. c) The process of optimizing computer performance. d) The development of new computer technologies. 29 / 30 29. Which network topology connects each device in a linear sequence? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 30 / 30 30. What are some cybersecurity regulations and standards? a) GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), PCI DSS (Payment Card Industry Data Security Standard), ISO/IEC 27001. b) HTML (Hypertext Markup Language), CSS (Cascading Style Sheets), JavaScript, PHP (Hypertext Preprocessor). c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study