Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is the role of cryptography in blockchain technology? a) Cryptography is used to secure transactions and data on the blockchain, ensuring confidentiality, integrity, and authenticity. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 2 / 30 2. What is the difference between public and private blockchains? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Public blockchains are decentralized networks open to anyone to participate and verify transactions, while private blockchains are permissioned networks controlled by a single organization or consortium. 3 / 30 3. What types of identifiers can be protected as trademarks? a) Words, logos, symbols, slogans, or combinations thereof used to represent goods or services in commerce. b) New and useful inventions, processes, methods, or compositions of matter. c) Literary works, artistic works, musical works, dramatic works, and other creative expressions. d) Ideas, concepts, facts, and theories. 4 / 30 4. What role does the Product Owner play in Agile Development Methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The Product Owner is responsible for representing the interests of the stakeholders, defining and prioritizing the product backlog, and ensuring that the development team delivers value to the customer. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. Which network device operates at the Physical layer of the OSI model and simply repeats incoming electrical signals to all connected devices? a) Hub b) Switch c) Router d) Bridge 6 / 30 6. What is memory hierarchy in computer architecture? a) The physical design and layout of computer memory components. b) The process of executing instructions in a program. c) The organization of computer memory into different levels based on access speed, capacity, and cost. d) The software used for managing computer hardware. 7 / 30 7. What are some common types of cybercrime? a) Hacking, phishing, malware, identity theft, online fraud, cyberbullying. b) Software development, data analysis, network administration, cloud computing. c) Hardware manufacturing, system integration, network infrastructure deployment. d) Graphic design, web development, multimedia production, user interface design. 8 / 30 8. What is the Turing Test? a) A test used to evaluate the intelligence of a machine by assessing its ability to exhibit behavior indistinguishable from that of a human. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 9 / 30 9. What is a virus? a) A type of encryption algorithm. b) A program that self-replicates and spreads by inserting copies of itself into other programs or files. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 10 / 30 10. Which type of network is commonly used to provide internet access to users within a home or office environment? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 11 / 30 11. What is a domain? a) The physical location of a website's server. b) The unique address used to access a website on the internet. c) The software used to host a website. d) The company that owns a website. 12 / 30 12. What is intellectual property? a) The physical components of a computer system. b) Software applications used for managing computer hardware. c) The rights granted to individuals or organizations to control the use and distribution of their creative works, inventions, and discoveries. d) The study of computer algorithms and data structures. 13 / 30 13. What is unsupervised learning? a) Learning from labeled data with input-output pairs to make predictions or classifications. b) Learning from unlabeled data to discover patterns or structures. c) Learning through interaction with an environment to maximize rewards. d) The study of computer algorithms and data structures. 14 / 30 14. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 15 / 30 15. Which network device operates at the Network layer of the OSI model and forwards data packets between different networks based on IP addresses? a) Hub b) Switch c) Router d) Bridge 16 / 30 16. What types of works are protected by copyright? a) Literary works, artistic works, musical works, dramatic works, and other creative expressions fixed in a tangible medium of expression. b) Inventions, processes, methods, and discoveries. c) Logos, symbols, names, and slogans used to identify and distinguish products or services. d) Ideas, concepts, facts, and theories. 17 / 30 17. What are the benefits of IoT? a) Improved efficiency, increased convenience, enhanced decision-making, automation of tasks, new business opportunities. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. Which network device operates at the Data Link layer of the OSI model and uses MAC addresses to forward data packets within the same network segment? a) Hub b) Switch c) Router d) Bridge 19 / 30 19. Which type of network is commonly used in homes, schools, and small businesses to connect devices within a limited area? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 20 / 30 20. Which network topology connects devices in a closed loop, where each device is connected to exactly two other devices? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 21 / 30 21. What are some challenges of blockchain technology? a) Scalability, interoperability, regulatory uncertainty, energy consumption, privacy concerns. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 22 / 30 22. What is an internet? a) A global network of interconnected computers and devices. b) A single computer system with multiple processing units. c) A local area network within a single building or campus. d) A protocol used for sending emails. 23 / 30 23. Which network component connects multiple networks together and forwards data packets between them based on IP addresses? a) Router b) Switch c) Modem d) Hub 24 / 30 24. What is multimedia software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for playing multimedia files, such as audio and video. c) Software used for managing computer networks and resources. d) Software used for word processing and document creation. 25 / 30 25. What is the Internet? a) A global network of interconnected computers and devices. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 26 / 30 26. What is an external hard drive? a) A storage device located inside the computer case used for storing data. b) A software application used for managing computer hardware. c) A device connected to a computer externally for storing data, typically using a USB or Thunderbolt interface. d) A type of optical disc used for storing data. 27 / 30 27. What are some common types of game controllers? a) Gamepads, joysticks, steering wheels, motion controllers. b) Keyboards, mice, touchpads, styluses. c) Webcams, scanners, printers, microphones. d) Monitors, speakers, headphones, projectors. 28 / 30 28. What are the primary functions of main memory in the memory hierarchy? a) To store frequently accessed data and instructions to speed up processing. b) To provide long-term storage for data and instructions. c) To manage communication between the CPU and other components of the computer system. d) To provide temporary storage for data and instructions that are currently being processed by the CPU. 29 / 30 29. What is antivirus software? a) Software that protects computer hardware from physical damage. b) Software that prevents unauthorized access to computer systems. c) Software that detects, prevents, and removes malicious software (malware) from a computer system. d) Software used for encrypting sensitive data. 30 / 30 30. How many gigabytes are in a terabyte (TB)? a) 1000 b) 1024 c) 2048 d) 4096 Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study