Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which type of memory is used to expand the effective size of the main memory by using a portion of the hard disk as an extension? a) RAM b) ROM c) Cache Memory d) Virtual Memory 2 / 30 2. What is a variable? a) A fixed value in a program that cannot be changed. b) A programming language used for writing code. c) A placeholder for storing data that can vary or change during the execution of a program. d) A type of malware. 3 / 30 3. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 4 / 30 4. What are some common cybercrime threats and attacks targeting individuals and organizations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some common cybercrime threats and attacks targeting individuals and organizations include malware infections, phishing scams, ransomware attacks, data breaches, identity theft, financial fraud, social engineering exploits, insider threats, denial-of-service (DoS) attacks, and supply chain vulnerabilities. 5 / 30 5. Which network device operates at the Data Link layer of the OSI model and uses MAC addresses to forward data packets within the same network segment? a) Hub b) Switch c) Router d) Bridge 6 / 30 6. What is the Internet of Things (IoT)? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A network of interconnected devices embedded with sensors, software, and other technologies to exchange data and communicate with each other and the internet. d) The physical components of a computer system. 7 / 30 7. What are the advantages of using R for machine learning? a) The advantages of using R for machine learning include powerful statistical capabilities, extensive libraries, interactive visualization, and a vibrant community of users and developers. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 8 / 30 8. Which type of network is commonly used in homes, schools, and small businesses to connect devices within a limited area? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 9 / 30 9. What are some features of Google Slides? a) Real-time collaboration, automatic saving, and version history. b) Video editing and graphic design tools. c) Web browsing and email functionality. d) Gaming and entertainment features. 10 / 30 10. What is SVN (Subversion), and how does it differ from Git? a) SVN (Subversion) is a centralized version control system (CVCS) that uses a central repository to store project history, requiring developers to be online to access and commit changes, while Git is a distributed version control system (DVCS) that allows each developer to have a complete copy of the repository on their local machine, enabling offline and independent work. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 11 / 30 11. Which type of network may utilize technologies such as leased lines, fiber optics, and satellite links for long-distance communication? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 12 / 30 12. What is the role of cryptography in blockchain technology? a) Cryptography is used to secure transactions and data on the blockchain, ensuring confidentiality, integrity, and authenticity. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 13 / 30 13. What is unsupervised learning in machine learning? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Unsupervised learning is a type of machine learning where the algorithm learns from unlabeled data, identifying patterns, structures, or relationships without guidance. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 14 / 30 14. What are some challenges of blockchain technology? a) Scalability, interoperability, regulatory uncertainty, energy consumption, privacy concerns. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What are the primary functions of registers in the memory hierarchy? a) To provide temporary storage for data and instructions that are currently being processed by the CPU. b) To store frequently accessed data and instructions to speed up processing. c) To provide long-term storage for data and instructions. d) To manage communication between the CPU and other components of the computer system. 16 / 30 16. What is a hyperlink? a) A type of network topology. b) A clickable element on a web page that redirects to another web page or resource. c) A protocol used for sending emails. d) A physical device used to connect computers to the internet. 17 / 30 17. What is an optical disc drive (ODD)? a) A storage device located inside the computer case used for storing data. b) A software application used for managing computer hardware. c) A device that uses laser technology to read and write data on optical discs, such as CDs, DVDs, and Blu-ray discs. d) A type of external hard drive. 18 / 30 18. Which type of memory is designed for high-speed access and stores frequently accessed data to reduce the latency of memory access? a) RAM b) ROM c) Cache Memory d) Virtual Memory 19 / 30 19. What is the role of cybersecurity regulations in mitigating cybercrime risks and protecting digital assets? a) Cybersecurity regulations play a critical role in mitigating cybercrime risks and protecting digital assets by establishing legal requirements, standards, and guidelines for organizations to implement comprehensive cybersecurity measures, practices, and controls to safeguard sensitive information, prevent data breaches, and respond effectively to cyber threats and incidents, ensuring compliance with regulatory requirements, protecting consumer privacy, and enhancing cybersecurity resilience and readiness across industries and sectors. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 20 / 30 20. Which network topology connects each device in a linear sequence? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 21 / 30 21. What are input devices? a) Devices used for outputting data from a computer system. b) Devices used for connecting to a network. c) Devices used for entering data and commands into a computer system. d) Devices used for storing data externally. 22 / 30 22. What is exploratory data analysis (EDA) in data analytics? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Exploratory data analysis (EDA) involves exploring and visualizing data to gain insights, identify patterns, and formulate hypotheses for further analysis. 23 / 30 23. What are the primary functions of main memory in the memory hierarchy? a) To store frequently accessed data and instructions to speed up processing. b) To provide long-term storage for data and instructions. c) To manage communication between the CPU and other components of the computer system. d) To provide temporary storage for data and instructions that are currently being processed by the CPU. 24 / 30 24. What are some popular programming languages used in machine learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some popular programming languages used in machine learning include Python, R, Java, and Julia. 25 / 30 25. Which network component provides a central point for connecting devices within a network and facilitates communication between them? a) Router b) Switch c) Modem d) Hub 26 / 30 26. Which type of network is commonly used to provide internet access to users within a home or office environment? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 27 / 30 27. What are conditional statements? a) Statements that are executed in a specific sequence regardless of any conditions. b) Statements that control the flow of execution in a program based on specified conditions or criteria. c) Statements used for declaring variables in a program. d) The process of executing a program. 28 / 30 28. What is ransomware? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware that encrypts files or locks computer systems, demanding payment (ransom) for their release. 29 / 30 29. What are some common uses of projectors? a) Presentations, lectures, movie screenings, digital signage. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Video conferencing, live streaming, online gaming. 30 / 30 30. What is the difference between public and private blockchains? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Public blockchains are decentralized networks open to anyone to participate and verify transactions, while private blockchains are permissioned networks controlled by a single organization or consortium. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs: Click to share on Facebook (Opens in new window) Facebook Click to share on WhatsApp (Opens in new window) WhatsApp Click to share on X (Opens in new window) X Click to share on LinkedIn (Opens in new window) LinkedIn Click to share on Reddit (Opens in new window) Reddit