Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is the purpose of the Testing phase in the Software Development Life Cycle (SDLC)? a) The purpose of the Testing phase is to verify and validate the software system against the specified requirements, ensuring that it meets quality standards, is free of defects, and performs as expected under various conditions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 2 / 30 2. What are some common uses of scanners? a) Digitizing documents, photos, artwork, and other printed materials. b) Recording audio, editing videos, creating graphics. c) Playing video games, controlling drones, capturing virtual reality content. d) Video conferencing, live streaming, online gaming. 3 / 30 3. What is two-factor authentication (2FA)? a) A type of encryption algorithm. b) A password policy requiring users to change their passwords regularly. c) A security mechanism that requires users to provide two different authentication factors to verify their identity. d) A type of firewall. 4 / 30 4. Which network component is responsible for determining the best path for data packets to reach their destination across multiple networks? a) Router b) Switch c) Modem d) Hub 5 / 30 5. What are data types? a) Categories of programming languages. b) A fixed set of values and operations that can be performed on them in a programming language. c) The process of executing a program. d) A type of malware. 6 / 30 6. Which programming language is known for its high-performance computing capabilities in machine learning? a) Julia is known for its high-performance computing capabilities in machine learning, making it suitable for computationally intensive tasks and large-scale datasets. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 7 / 30 7. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 8 / 30 8. What is the purpose of a Change Log or Release Notes in software development? a) The purpose of a Change Log or Release Notes is to document the changes, enhancements, bug fixes, and new features introduced in each version or release of the software, providing users, developers, and stakeholders with an overview of the changes and improvements made over time. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 9 / 30 9. What is the decimal equivalent of the binary number 11100? a) 20 b) 24 c) 28 d) 32 10 / 30 10. What is an internet? a) A global network of interconnected computers and devices. b) A single computer system with multiple processing units. c) A local area network within a single building or campus. d) A protocol used for sending emails. 11 / 30 11. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) A type of malware. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 12 / 30 12. What is the Arithmetic Logic Unit (ALU) in a CPU? a) The component of the CPU responsible for performing arithmetic and logical operations on data. b) The component of the CPU responsible for fetching instructions from memory, decoding them, and executing them. c) The component of the CPU responsible for temporarily storing data and instructions. d) The component of the CPU responsible for managing communication between the CPU and other components of the computer system. 13 / 30 13. Which type of network is commonly used to provide internet access to users within a home or office environment? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 14 / 30 14. What is a Trojan horse? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware disguised as legitimate software that appears harmless but contains malicious code that performs unauthorized actions when executed. 15 / 30 15. What is a patent? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 16 / 30 16. What is blockchain technology? a) A decentralized digital ledger that records transactions across multiple computers in a way that is transparent, secure, and immutable. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. Which type of memory retains its data even when the power is turned off and is commonly used to store BIOS firmware? a) RAM b) ROM c) Cache Memory d) Virtual Memory 18 / 30 18. What is a scanner? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for controlling video games and simulations. d) A device used for storing data externally. 19 / 30 19. What is Microsoft PowerPoint? a) A type of antivirus software. b) A web browser developed by Microsoft. c) Presentation software developed by Microsoft for creating and delivering slideshows. d) A social media platform developed by Microsoft. 20 / 30 20. What types of inventions are eligible for patent protection? a) New and useful inventions, processes, methods, or compositions of matter that are novel, non-obvious, and industrially applicable. b) Literary works, artistic works, musical works, dramatic works, and other creative expressions fixed in a tangible medium of expression. c) Logos, symbols, names, and slogans used to identify and distinguish products or services. d) Ideas, concepts, facts, and theories. 21 / 30 21. What is the difference between public and private blockchains? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Public blockchains are decentralized networks open to anyone to participate and verify transactions, while private blockchains are permissioned networks controlled by a single organization or consortium. 22 / 30 22. What are the primary functions of main memory in the memory hierarchy? a) To store frequently accessed data and instructions to speed up processing. b) To provide long-term storage for data and instructions. c) To manage communication between the CPU and other components of the computer system. d) To provide temporary storage for data and instructions that are currently being processed by the CPU. 23 / 30 23. What is a variable? a) A fixed value in a program that cannot be changed. b) A programming language used for writing code. c) A placeholder for storing data that can vary or change during the execution of a program. d) A type of malware. 24 / 30 24. What is a webcam? a) A device used for capturing images and videos of physical documents. b) A device used for scanning printed text and converting it into digital format. c) A device used for capturing images and videos of scenes or individuals, typically for video conferencing or streaming. d) A device used for controlling video games and simulations. 25 / 30 25. What are some benefits of using surge protectors? a) Protection against power surges, prevention of damage to electronic devices, extension of device lifespan. b) Enhanced network connectivity, faster data transfer rates, improved graphics performance. c) Increased storage capacity, reduced system boot time, enhanced security features. d) Improved sound quality, faster processing speeds, better image resolution. 26 / 30 26. Which network component connects multiple networks together and forwards data packets between them based on IP addresses? a) Router b) Switch c) Modem d) Hub 27 / 30 27. What is intellectual property? a) The physical components of a computer system. b) Software applications used for managing computer hardware. c) The rights granted to individuals or organizations to control the use and distribution of their creative works, inventions, and discoveries. d) The study of computer algorithms and data structures. 28 / 30 28. What is robotics? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A field of AI and engineering that focuses on designing, building, and programming robots to perform tasks autonomously or semi-autonomously. d) The physical components of a computer system. 29 / 30 29. What is a Git merge, and how does it work in version control? a) Git merge is a version control operation that combines changes from one branch into another, integrating new features, bug fixes, or changes made in a feature branch back into the main branch or another target branch, preserving the commit history and resolving conflicts if necessary. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. What is multimedia software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for playing multimedia files, such as audio and video. c) Software used for managing computer networks and resources. d) Software used for word processing and document creation. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study