Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is an optical disc drive (ODD)? a) A storage device located inside the computer case used for storing data. b) A software application used for managing computer hardware. c) A device that uses laser technology to read and write data on optical discs, such as CDs, DVDs, and Blu-ray discs. d) A type of external hard drive. 2 / 30 2. What is the binary representation of the decimal number 15? a) 1111 b) 1010 c) 1101 d) 1001 3 / 30 3. What are the main types of machine learning? a) The main types of machine learning are supervised learning, unsupervised learning, and reinforcement learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 4 / 30 4. Which type of network covers a small geographical area, typically within a single building or campus? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 5 / 30 5. Which network topology connects all devices to a central hub or switch? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 6 / 30 6. What is a projector? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for displaying visual content, such as images and videos, on a large screen or surface. d) A device used for controlling video games and simulations. 7 / 30 7. What is encryption key? a) A physical key used to lock and unlock computer hardware. b) A cryptographic algorithm used for data encryption. c) A secret value used in encryption and decryption processes to secure data. d) A type of malware. 8 / 30 8. What role does Julia play in machine learning programming? a) Julia is a high-level, high-performance programming language for technical computing, known for its speed, simplicity, and scalability, making it suitable for machine learning tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 9 / 30 9. Which network device operates at the Physical layer of the OSI model and simply repeats incoming electrical signals to all connected devices? a) Hub b) Switch c) Router d) Bridge 10 / 30 10. What are the key steps involved in the data analytics process? a) The key steps in the data analytics process include data collection, data preprocessing, data analysis, interpretation, and decision-making. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 11 / 30 11. How do cybersecurity regulations help mitigate cyber threats and protect critical infrastructure? a) Cybersecurity regulations help mitigate cyber threats and protect critical infrastructure by establishing legal requirements, standards, and guidelines for implementing robust cybersecurity measures, practices, and controls to safeguard essential services, systems, and networks from cyber attacks, intrusions, and disruptions, ensuring the resilience, reliability, and availability of critical infrastructure assets, protecting public safety, national security, and economic stability, and promoting collaboration, information sharing, and coordination among government agencies, regulatory authorities, industry stakeholders, and cybersecurity experts to address emerging cyber threats and vulnerabilities effectively. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. What is the main objective of the Implementation phase in the Software Development Life Cycle (SDLC)? a) The main objective of the Implementation phase is to translate the design specifications into executable code, following coding standards, best practices, and guidelines, to build the software system. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What is robotics? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A field of AI and engineering that focuses on designing, building, and programming robots to perform tasks autonomously or semi-autonomously. d) The physical components of a computer system. 14 / 30 14. What are some examples of IoT applications in agriculture? a) Precision agriculture, crop monitoring, livestock tracking, automated irrigation systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. Which type of memory is used to expand the effective size of the main memory by using a portion of the hard disk as an extension? a) RAM b) ROM c) Cache Memory d) Virtual Memory 16 / 30 16. What is CPU architecture? a) The physical design and layout of a central processing unit (CPU). b) The process of executing instructions in a program. c) A type of programming language. d) The software used for managing computer hardware. 17 / 30 17. What is a Git repository, and how is it used in version control? a) A Git repository is a data structure that stores metadata and content related to a project, including source code files, commit history, branches, and configuration settings, providing a centralized location for version control operations such as tracking changes, branching, merging, and collaboration. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. What are some common applications of machine learning? a) Common applications of machine learning include predictive analytics, recommendation systems, natural language processing, computer vision, and autonomous vehicles. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 19 / 30 19. What is the role of connectivity in IoT? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Connectivity enables IoT devices to exchange data and communicate with each other and the internet, forming a networked ecosystem. 20 / 30 20. What are conditional statements? a) Statements that are executed in a specific sequence regardless of any conditions. b) Statements that control the flow of execution in a program based on specified conditions or criteria. c) Statements used for declaring variables in a program. d) The process of executing a program. 21 / 30 21. What is the Arithmetic Logic Unit (ALU) in a CPU? a) The component of the CPU responsible for performing arithmetic and logical operations on data. b) The component of the CPU responsible for fetching instructions from memory, decoding them, and executing them. c) The component of the CPU responsible for temporarily storing data and instructions. d) The component of the CPU responsible for managing communication between the CPU and other components of the computer system. 22 / 30 22. What are some features of Google Docs? a) Real-time collaboration, automatic saving, and version history. b) Video editing and graphic design tools. c) Web browsing and email functionality. d) Gaming and entertainment features. 23 / 30 23. What is the Internet? a) A global network of interconnected computers and devices. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 24 / 30 24. What is a web page? a) A physical device used to connect computers to the internet. b) A single document displayed in a web browser. c) A software application used for communication between computers. d) A collection of interconnected websites. 25 / 30 25. What is the main advantage of using cloud-based presentation software like Google Slides? a) Offline access to presentations. b) Real-time collaboration and sharing of presentations with others. c) Advanced design and animation features. d) Integration with desktop applications. 26 / 30 26. What are the core values of Agile Development Methodology, as outlined in the Agile Manifesto? a) The core values of Agile Development Methodology, as outlined in the Agile Manifesto, include individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and responding to change over following a plan. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What is a URL? a) A unique identifier for a website. b) A software application used for communication between computers. c) A protocol used for sending emails. d) A web address that specifies the location of a web page on the internet. 28 / 30 28. What are the key roles in Scrum, an Agile methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The key roles in Scrum include the Product Owner, Scrum Master, and Development Team, each with distinct responsibilities and contributions to the Agile development process. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 29 / 30 29. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) A type of malware. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 30 / 30 30. What are the primary functions of the Control Unit (CU)? a) To perform arithmetic and logical operations on data. b) To fetch instructions from memory, decode them, and execute them. c) To temporarily store data and instructions. d) To manage communication between the CPU and other components of the computer system. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study