Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What are the primary functions of the Control Unit (CU)? a) To perform arithmetic and logical operations on data. b) To fetch instructions from memory, decode them, and execute them. c) To temporarily store data and instructions. d) To manage communication between the CPU and other components of the computer system. 2 / 30 2. What are some popular programming languages used in machine learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some popular programming languages used in machine learning include Python, R, Java, and Julia. 3 / 30 3. What are some common operations performed in Git version control? a) Common operations performed in Git version control include cloning repositories to create local copies, adding and committing changes to the repository, creating and switching between branches for parallel development, merging changes from different branches, and pushing and pulling changes between local and remote repositories. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 4 / 30 4. What is a password? a) A physical device used for user authentication. b) A secret combination of characters used for user authentication to access a computer system or account. c) A type of encryption algorithm. d) A type of malware. 5 / 30 5. How many bytes are in a kilobyte (KB)? a) 100 b) 1024 c) 2048 d) 4096 6 / 30 6. What is the concept of the "smart home" in IoT? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The integration of IoT devices and technologies to automate and control various aspects of home environments, such as lighting, heating, security, and entertainment. d) The physical components of a computer system. 7 / 30 7. What are some common uses of headphones? a) Listening to music, watching movies, playing video games. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Video conferencing, live streaming, online gaming. 8 / 30 8. What are the core values of Agile Development Methodology, as outlined in the Agile Manifesto? a) The core values of Agile Development Methodology, as outlined in the Agile Manifesto, include individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and responding to change over following a plan. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 9 / 30 9. Why is ethics important in computing? a) To ensure compliance with legal regulations and industry standards. b) To prevent unethical behavior and harmful consequences in the use and development of computer technology. c) To improve the efficiency and performance of computer systems. d) To enhance the aesthetics and user experience of software applications. 10 / 30 10. What is a webcam? a) A device used for capturing images and videos of physical documents. b) A device used for scanning printed text and converting it into digital format. c) A device used for capturing images and videos of scenes or individuals, typically for video conferencing or streaming. d) A device used for controlling video games and simulations. 11 / 30 11. Which type of memory is directly accessed by the CPU for storing and retrieving data and instructions during program execution? a) RAM b) ROM c) Cache Memory d) Virtual Memory 12 / 30 12. What is malware? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 13 / 30 13. What is graphics software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for word processing and document creation. c) Software used for managing computer networks and resources. d) Software used for playing multimedia files. 14 / 30 14. What is the goal of AI in robotics? a) To create robots that can perform tasks more efficiently and effectively than humans. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) To develop robots with human-like intelligence and consciousness. 15 / 30 15. What is feature engineering in machine learning? a) Feature engineering is the process of selecting, transforming, or creating new features from raw data to improve the performance of machine learning models. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 16 / 30 16. Which network component helps to extend the range of a wireless network and provides wireless connectivity to devices such as laptops and smartphones? a) Router b) Switch c) Modem d) Access Point 17 / 30 17. What is the principle of privacy by design, and how does it apply to software development? a) Privacy by design is a principle that advocates for embedding privacy and data protection considerations into the design, development, and implementation of software systems and applications from the outset, ensuring that privacy-enhancing features and safeguards are integrated into the core architecture and functionality of the software. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. What is a UPS (Uninterruptible Power Supply)? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 19 / 30 19. Which network component operates at the Physical layer of the OSI model and simply repeats incoming signals to all connected devices? a) Router b) Switch c) Modem d) Hub 20 / 30 20. What is model evaluation in machine learning? a) Model evaluation is the process of assessing the performance and generalization ability of machine learning models using evaluation metrics and validation techniques. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 21 / 30 21. What is autonomous navigation? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The ability of robots or vehicles to navigate and move in their environment without human intervention. d) The physical components of a computer system. 22 / 30 22. How does blockchain achieve decentralization? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) By distributing transaction data across multiple computers (nodes) in a network, eliminating the need for a central authority or intermediary. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 23 / 30 23. Which type of memory is used by the operating system to create an illusion of a larger main memory by transferring data between RAM and the hard disk? a) RAM b) ROM c) Cache Memory d) Virtual Memory 24 / 30 24. What is cybersecurity? a) The process of securely storing data on computer systems. b) The protection of computer systems and networks from cyber threats, such as hackers, malware, and data breaches. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 25 / 30 25. What is Microsoft Word? a) A type of antivirus software. b) A web browser developed by Microsoft. c) Word processing software developed by Microsoft for creating, editing, and formatting text documents. d) A social media platform developed by Microsoft. 26 / 30 26. What are some potential applications of blockchain technology beyond cryptocurrencies? a) Supply chain management, voting systems, identity verification, intellectual property protection, healthcare records management. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What are some common applications of machine learning? a) Common applications of machine learning include predictive analytics, recommendation systems, natural language processing, computer vision, and autonomous vehicles. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 28 / 30 28. What are some potential ethical challenges and risks associated with the use of artificial intelligence (AI) in decision-making processes? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Some potential ethical challenges and risks associated with the use of artificial intelligence (AI) in decision-making processes include biases and discrimination, lack of transparency and explainability, privacy infringements and surveillance, job displacement and automation, accountability and liability issues, and societal impact and human welfare concerns. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 29 / 30 29. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 30 / 30 30. What is a trademark? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs: Click to share on Facebook (Opens in new window) Facebook Click to share on WhatsApp (Opens in new window) WhatsApp Click to share on X (Opens in new window) X Click to share on LinkedIn (Opens in new window) LinkedIn Click to share on Reddit (Opens in new window) Reddit