Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which type of memory is typically faster than secondary storage but slower than cache memory and main memory? a) RAM b) ROM c) Cache Memory d) Virtual Memory 2 / 30 2. What is the role of R in machine learning? a) R is a programming language and environment for statistical computing and graphics, commonly used for data analysis, visualization, and statistical modeling in machine learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 3 / 30 3. What are some common data preprocessing techniques? a) Common data preprocessing techniques include data cleaning, data transformation, feature engineering, and dimensionality reduction. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 4 / 30 4. What are some common uses of projectors? a) Presentations, lectures, movie screenings, digital signage. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Video conferencing, live streaming, online gaming. 5 / 30 5. What are output devices? a) Devices used for storing data externally. b) Devices used for connecting to a network. c) Devices used for displaying or presenting data or information generated by a computer system. d) Devices used for entering data and commands into a computer system. 6 / 30 6. What are some examples of IoT applications in agriculture? a) Precision agriculture, crop monitoring, livestock tracking, automated irrigation systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. What are the primary functions of cache memory in the memory hierarchy? a) To provide temporary storage for data and instructions that are currently being processed by the CPU. b) To store frequently accessed data and instructions to speed up processing. c) To provide long-term storage for data and instructions. d) To manage communication between the CPU and other components of the computer system. 8 / 30 8. What is the difference between descriptive and inferential statistics in data analytics? a) Descriptive statistics involve summarizing and describing the characteristics of a dataset, while inferential statistics involve making predictions or inferences about a population based on sample data. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 9 / 30 9. What is a password? a) A physical device used for user authentication. b) A secret combination of characters used for user authentication to access a computer system or account. c) A type of encryption algorithm. d) A type of malware. 10 / 30 10. How many megabytes are in a terabyte (TB)? a) 1,024 b) 1,048,576 c) 1,073,741,824 d) 1,099,511,627,776 11 / 30 11. What is a URL? a) A unique identifier for a website. b) A software application used for communication between computers. c) A protocol used for sending emails. d) A web address that specifies the location of a web page on the internet. 12 / 30 12. What are headphones? a) Devices used for capturing images and videos of scenes or individuals. b) Devices used for scanning printed text and converting it into digital format. c) Devices used for producing audio output and worn over the ears by the user. d) Devices used for controlling video games and simulations. 13 / 30 13. Which network topology connects all devices to a central hub or switch? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 14 / 30 14. What is the main advantage of using cloud-based spreadsheet software like Google Sheets? a) Offline access to spreadsheets. b) Real-time collaboration and sharing of spreadsheets with others. c) Advanced data analysis tools. d) Integration with desktop applications. 15 / 30 15. What is a Git branch, and how is it used in version control? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A Git branch is a lightweight movable pointer to a commit in the commit history, representing an independent line of development with its own set of changes and history, enabling parallel development, isolation of changes, and experimentation without affecting the main codebase. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 16 / 30 16. Why is ethics important in the field of computing? a) Ethics is important in computing to ensure that technology is developed, used, and managed in a responsible, ethical, and socially acceptable manner, considering the impact on individuals, society, and the environment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. How many kilobytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 18 / 30 18. Which type of memory is used by the operating system to create an illusion of a larger main memory by transferring data between RAM and the hard disk? a) RAM b) ROM c) Cache Memory d) Virtual Memory 19 / 30 19. What are other accessories commonly used with computer systems? a) Devices used for input and output operations. b) Peripheral devices used for connecting to a network. c) Additional components or devices used to enhance the functionality or protect computer systems. d) Software applications used for managing computer hardware. 20 / 30 20. Which programming language is commonly used for implementing deep learning algorithms? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Python is commonly used for implementing deep learning algorithms due to its extensive libraries and frameworks such as TensorFlow, PyTorch, and Keras. 21 / 30 21. Which network component is typically used in Ethernet networks to provide multiple ports for connecting devices within the same network segment? a) Router b) Switch c) Modem d) Hub 22 / 30 22. What is programming logic? a) The process of writing code in a programming language. b) The systematic approach to problem-solving using logical and computational thinking. c) The hardware components of a computer system. d) The process of designing user interfaces for software applications. 23 / 30 23. What are intellectual property rights in computing? a) The rights granted to individuals or organizations to control the use and distribution of their creative works, inventions, and discoveries. b) The protection of computer systems and data from threats, such as viruses, hackers, and cyber attacks. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 24 / 30 24. What is a website? a) A physical device used to connect computers to the internet. b) A collection of networked computers sharing resources. c) A software application used for communication between computers. d) A collection of web pages accessible via the World Wide Web. 25 / 30 25. What is the decimal equivalent of the binary number 11100? a) 20 b) 24 c) 28 d) 32 26 / 30 26. What is memory hierarchy in computer architecture? a) The physical design and layout of computer memory components. b) The process of executing instructions in a program. c) The organization of computer memory into different levels based on access speed, capacity, and cost. d) The software used for managing computer hardware. 27 / 30 27. What are the key roles in Scrum, an Agile methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The key roles in Scrum include the Product Owner, Scrum Master, and Development Team, each with distinct responsibilities and contributions to the Agile development process. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 28 / 30 28. What is flowchart? a) A programming language used for writing code. b) A type of malware. c) A visual representation of the sequence of steps and decision points in an algorithm or process, using symbols and arrows to depict the flow of control. d) The process of executing a program. 29 / 30 29. How many megabytes are in a gigabyte (GB)? a) 1000 b) 1024 c) 2048 d) 4096 30 / 30 30. What are some challenges of blockchain technology? a) Scalability, interoperability, regulatory uncertainty, energy consumption, privacy concerns. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study