Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is a projector? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for displaying visual content, such as images and videos, on a large screen or surface. d) A device used for controlling video games and simulations. 2 / 30 2. Which type of memory is typically faster than secondary storage but slower than cache memory and main memory? a) RAM b) ROM c) Cache Memory d) Virtual Memory 3 / 30 3. What is computer security? a) The protection of computer hardware from physical damage. b) The prevention of unauthorized access to computer systems and data. c) The process of optimizing computer performance. d) The development of new computer technologies. 4 / 30 4. Which network component converts digital signals from a computer into analog signals suitable for transmission over analog communication lines? a) Router b) Switch c) Modem d) Hub 5 / 30 5. What is the difference between public and private blockchains? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Public blockchains are decentralized networks open to anyone to participate and verify transactions, while private blockchains are permissioned networks controlled by a single organization or consortium. 6 / 30 6. What is the role of consensus mechanisms in blockchain? a) Consensus mechanisms are protocols or algorithms used to achieve agreement among nodes in a decentralized network regarding the validity of transactions and the state of the blockchain. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 7 / 30 7. What activities are typically performed during the Maintenance phase of the Software Development Life Cycle (SDLC)? a) Activities performed during the Maintenance phase include bug fixing, enhancements, updates, optimizations, and ongoing support and maintenance to ensure the continued reliability, usability, and performance of the software system. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 8 / 30 8. Which of the following is NOT a type of optical disc? a) CD (Compact Disc) b) DVD (Digital Versatile Disc) c) SSD (Solid State Drive) d) Blu-ray Disc 9 / 30 9. What is the role of connectivity in IoT? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Connectivity enables IoT devices to exchange data and communicate with each other and the internet, forming a networked ecosystem. 10 / 30 10. What are some common algorithms used in supervised learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Common algorithms used in supervised learning include linear regression, logistic regression, decision trees, random forests, support vector machines (SVM), and neural networks. 11 / 30 11. Which network device operates at the Network layer of the OSI model and forwards data packets between different networks based on IP addresses? a) Hub b) Switch c) Router d) Bridge 12 / 30 12. What are the key benefits of using a Version Control System (VCS) in software development? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The key benefits of using a Version Control System (VCS) include versioning and history tracking, collaboration and team coordination, conflict resolution, backup and disaster recovery, and code quality and stability. 13 / 30 13. Which network component provides a central point for connecting devices within a network and facilitates communication between them? a) Router b) Switch c) Modem d) Hub 14 / 30 14. What are some examples of IoT applications in agriculture? a) Precision agriculture, crop monitoring, livestock tracking, automated irrigation systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. Which programming language is known for its simplicity and readability in machine learning? a) Sorting algorithms, searching algorithms, graph algorithms. b) Python is known for its simplicity and readability in machine learning, making it accessible for beginners and experts alike. c) The study of computer algorithms and data structures. d) The process of securely storing data on computer systems. 16 / 30 16. What is SVN (Subversion), and how does it differ from Git? a) SVN (Subversion) is a centralized version control system (CVCS) that uses a central repository to store project history, requiring developers to be online to access and commit changes, while Git is a distributed version control system (DVCS) that allows each developer to have a complete copy of the repository on their local machine, enabling offline and independent work. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 17 / 30 17. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 18 / 30 18. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 19 / 30 19. What are some cybersecurity regulations and standards? a) GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), PCI DSS (Payment Card Industry Data Security Standard), ISO/IEC 27001. b) HTML (Hypertext Markup Language), CSS (Cascading Style Sheets), JavaScript, PHP (Hypertext Preprocessor). c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 20 / 30 20. Why is ethics important in the field of computing? a) Ethics is important in computing to ensure that technology is developed, used, and managed in a responsible, ethical, and socially acceptable manner, considering the impact on individuals, society, and the environment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 21 / 30 21. What are some advantages of optical disc drives? a) Long-term data retention, compatibility with a wide range of devices, and low cost. b) Portable, easy to connect, and offer high storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 22 / 30 22. How many bits are in a kilobyte (KB)? a) 8000 b) 8192 c) 10240 d) 102400 23 / 30 23. What are some examples of IoT applications in smart cities? a) Smart transportation systems, intelligent energy management, waste management, environmental monitoring, public safety. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 24 / 30 24. What are some popular programming languages used in machine learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some popular programming languages used in machine learning include Python, R, Java, and Julia. 25 / 30 25. What is Google Slides? a) A search engine developed by Google. b) A cloud-based presentation software developed by Google for creating and delivering slideshows online. c) An email service developed by Google. d) A social media platform developed by Google. 26 / 30 26. What are the different types of databases supported by DBMS? a) Relational databases, NoSQL databases, object-oriented databases, hierarchical databases. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What role does Julia play in machine learning programming? a) Julia is a high-level, high-performance programming language for technical computing, known for its speed, simplicity, and scalability, making it suitable for machine learning tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 28 / 30 28. What is the role of data visualization in data analytics? a) Data visualization involves representing data visually through charts, graphs, and dashboards to facilitate understanding, interpretation, and communication of insights. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 29 / 30 29. What are the key roles in Scrum, an Agile methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The key roles in Scrum include the Product Owner, Scrum Master, and Development Team, each with distinct responsibilities and contributions to the Agile development process. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. How many megabytes are in a terabyte (TB)? a) 1,024 b) 1,048,576 c) 1,073,741,824 d) 1,099,511,627,776 Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study