Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is flowchart? a) A programming language used for writing code. b) A type of malware. c) A visual representation of the sequence of steps and decision points in an algorithm or process, using symbols and arrows to depict the flow of control. d) The process of executing a program. 2 / 30 2. What are neural networks? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) A type of machine learning algorithm inspired by the structure and function of the human brain, consisting of interconnected nodes (neurons) organized in layers. 3 / 30 3. How many kilobytes are in a gigabyte (GB)? a) 1,048,576 b) 1,024,000 c) 1,000,000 d) 1,024 4 / 30 4. What is the significance of programming languages like Python and R in data science and machine learning? a) Programming languages like Python and R play a significant role in data science and machine learning by providing powerful tools, libraries, and frameworks for data analysis, modeling, and deployment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is a smart contract in blockchain technology? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Self-executing contracts with the terms of the agreement written in code, automatically enforced and executed when predefined conditions are met. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Self-executing contracts with the terms of the agreement written in code, automatically enforced and executed when predefined conditions are met. 6 / 30 6. What is a virus? a) A type of encryption algorithm. b) A program that self-replicates and spreads by inserting copies of itself into other programs or files. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 7 / 30 7. Which programming language is known for its simplicity and readability in machine learning? a) Sorting algorithms, searching algorithms, graph algorithms. b) Python is known for its simplicity and readability in machine learning, making it accessible for beginners and experts alike. c) The study of computer algorithms and data structures. d) The process of securely storing data on computer systems. 8 / 30 8. What is hacking? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) The unauthorized intrusion into a computer system or network with the intent to exploit vulnerabilities or gain access to restricted data or resources. d) A physical device used for user authentication. 9 / 30 9. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 10 / 30 10. What are some challenges of IoT? a) Security and privacy concerns, interoperability issues, scalability challenges, data management complexities, regulatory compliance. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 11 / 30 11. What are the advantages of Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) The advantages of Agile Development Methodology include increased flexibility, faster time-to-market, improved customer satisfaction, better quality software, and enhanced team collaboration and morale. d) The study of computer algorithms and data structures. 12 / 30 12. How many bytes are in a kilobyte (KB)? a) 100 b) 1024 c) 2048 d) 4096 13 / 30 13. What role does Julia play in machine learning programming? a) Julia is a high-level, high-performance programming language for technical computing, known for its speed, simplicity, and scalability, making it suitable for machine learning tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 14 / 30 14. What are registers in the memory hierarchy? a) The fastest and smallest type of computer memory located within the CPU. b) The largest and slowest type of computer memory used for long-term storage. c) A type of programming language. d) The software used for managing computer hardware. 15 / 30 15. What is a hyperlink? a) A type of network topology. b) A clickable element on a web page that redirects to another web page or resource. c) A protocol used for sending emails. d) A physical device used to connect computers to the internet. 16 / 30 16. How does blockchain achieve decentralization? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) By distributing transaction data across multiple computers (nodes) in a network, eliminating the need for a central authority or intermediary. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. What is two-factor authentication (2FA)? a) A type of encryption algorithm. b) A password policy requiring users to change their passwords regularly. c) A security mechanism that requires users to provide two different authentication factors to verify their identity. d) A type of firewall. 18 / 30 18. What is encryption? a) The process of hiding computer hardware from physical damage. b) The process of transforming plaintext data into ciphertext to make it unreadable to unauthorized users. c) The process of optimizing computer performance. d) The development of new computer technologies. 19 / 30 19. How does branching and merging work in Git version control? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Branching and merging in Git version control involves creating separate branches to work on different features or fixes independently, making changes in each branch, and merging changes from one branch into another to integrate new features or resolve conflicts. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 20 / 30 20. Which type of memory is typically faster than secondary storage but slower than cache memory and main memory? a) RAM b) ROM c) Cache Memory d) Virtual Memory 21 / 30 21. What are some common uses of headphones? a) Listening to music, watching movies, playing video games. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Video conferencing, live streaming, online gaming. 22 / 30 22. What are algorithms? a) Step-by-step procedures or instructions for solving a problem or accomplishing a task. b) Physical components of a computer system. c) Programming languages used for writing code. d) The process of executing a program. 23 / 30 23. What is a game controller? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for controlling video games and simulations. d) A device used for storing data externally. 24 / 30 24. Which technology is used to create immersive virtual experiences in Virtual Reality (VR)? a) Virtual Reality (VR) uses a combination of technologies such as head-mounted displays (HMDs), motion tracking sensors, haptic feedback devices, and immersive audio systems to create immersive virtual experiences. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. Which programming language is often considered the best for beginners in machine learning? a) Python is often considered the best programming language for beginners in machine learning due to its simplicity, readability, and extensive libraries. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 26 / 30 26. What is a projector? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for displaying visual content, such as images and videos, on a large screen or surface. d) A device used for controlling video games and simulations. 27 / 30 27. What is the main advantage of using cloud-based presentation software like Google Slides? a) Offline access to presentations. b) Real-time collaboration and sharing of presentations with others. c) Advanced design and animation features. d) Integration with desktop applications. 28 / 30 28. What is autonomous navigation? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The ability of robots or vehicles to navigate and move in their environment without human intervention. d) The physical components of a computer system. 29 / 30 29. What are some examples of multimedia software? a) Windows Media Player, VLC Media Player, iTunes. b) Adobe Photoshop, Adobe Illustrator, CorelDRAW. c) Microsoft Word, Google Docs, Microsoft Excel. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 30 / 30 30. What are the common Agile methodologies used in software development? a) Common Agile methodologies used in software development include Scrum, Kanban, Extreme Programming (XP), Lean, and Feature-Driven Development (FDD), each with its own principles, practices, and frameworks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study