Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. How many bytes are in a gigabyte (GB)? a) 1000 b) 1024 c) 2048 d) 4096 2 / 30 2. What is a patent? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 3 / 30 3. Which type of network may utilize technologies such as leased lines, fiber optics, and satellite links for long-distance communication? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 4 / 30 4. What is data preprocessing in data analytics? a) Data preprocessing involves cleaning, transforming, and integrating raw data to prepare it for analysis, ensuring data quality and consistency. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 5 / 30 5. What is a scanner? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for controlling video games and simulations. d) A device used for storing data externally. 6 / 30 6. Which type of memory is volatile and used for temporary storage of data and program instructions during the operation of a computer? a) RAM b) ROM c) Cache Memory d) Virtual Memory 7 / 30 7. What is Google Slides? a) A search engine developed by Google. b) A cloud-based presentation software developed by Google for creating and delivering slideshows online. c) An email service developed by Google. d) A social media platform developed by Google. 8 / 30 8. What is Microsoft PowerPoint? a) A type of antivirus software. b) A web browser developed by Microsoft. c) Presentation software developed by Microsoft for creating and delivering slideshows. d) A social media platform developed by Microsoft. 9 / 30 9. What are some ethical considerations in AI and robotics? a) Bias and fairness, transparency and explainability, accountability and responsibility, safety and security. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 10 / 30 10. Which programming language is often considered the best for beginners in machine learning? a) Python is often considered the best programming language for beginners in machine learning due to its simplicity, readability, and extensive libraries. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 11 / 30 11. What are some strategies for addressing biases and promoting fairness in artificial intelligence (AI) algorithms and decision-making systems? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some strategies for addressing biases and promoting fairness in artificial intelligence (AI) algorithms and decision-making systems include data preprocessing and cleaning, algorithmic fairness and bias mitigation techniques, diversity and inclusion in dataset collection and model training, transparency and explainability in AI systems, human oversight and accountability mechanisms, and ongoing monitoring and evaluation of AI systems for bias detection and correction. 12 / 30 12. What is feature engineering in machine learning? a) Feature engineering is the process of selecting, transforming, or creating new features from raw data to improve the performance of machine learning models. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 13 / 30 13. What are some common types of game controllers? a) Gamepads, joysticks, steering wheels, motion controllers. b) Keyboards, mice, touchpads, styluses. c) Webcams, scanners, printers, microphones. d) Monitors, speakers, headphones, projectors. 14 / 30 14. What is model evaluation in machine learning? a) Model evaluation is the process of assessing the performance and generalization ability of machine learning models using evaluation metrics and validation techniques. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What is unsupervised learning? a) Learning from labeled data with input-output pairs to make predictions or classifications. b) Learning from unlabeled data to discover patterns or structures. c) Learning through interaction with an environment to maximize rewards. d) The study of computer algorithms and data structures. 16 / 30 16. What is security in computing? a) The process of securely storing data on computer systems. b) The protection of computer systems and data from threats, such as viruses, hackers, and cyber attacks. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 17 / 30 17. What is multimedia software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for playing multimedia files, such as audio and video. c) Software used for managing computer networks and resources. d) Software used for word processing and document creation. 18 / 30 18. What are some challenges of blockchain technology? a) Scalability, interoperability, regulatory uncertainty, energy consumption, privacy concerns. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 19 / 30 19. What are some common uses of webcams? a) Video conferencing, live streaming, online gaming. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Playing video games, controlling drones, capturing virtual reality content. 20 / 30 20. What is the concept of the "smart home" in IoT? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The integration of IoT devices and technologies to automate and control various aspects of home environments, such as lighting, heating, security, and entertainment. d) The physical components of a computer system. 21 / 30 21. What is a surge protector? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges by regulating voltage levels. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 22 / 30 22. What is a URL? a) A unique identifier for a website. b) A software application used for communication between computers. c) A protocol used for sending emails. d) A web address that specifies the location of a web page on the internet. 23 / 30 23. What are deep learning networks? a) Neural networks with multiple hidden layers, capable of learning hierarchical representations of data and solving complex tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 24 / 30 24. What is the binary representation of the decimal number 63? a) 110011 b) 111111 c) 100101 d) 101011 25 / 30 25. What is overfitting in machine learning? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Overfitting occurs when a machine learning model learns to capture noise or random fluctuations in the training data, resulting in poor generalization to new, unseen data. d) The study of computer algorithms and data structures. 26 / 30 26. Which type of memory is used to temporarily store frequently accessed data and instructions to speed up the performance of the CPU? a) RAM b) ROM c) Cache Memory d) Virtual Memory 27 / 30 27. Which type of memory is faster but smaller in size compared to main memory, and is used to store frequently accessed data and instructions? a) RAM b) ROM c) Cache Memory d) Virtual Memory 28 / 30 28. What are some examples of AI applications? a) Natural language processing, computer vision, robotics, autonomous vehicles, virtual assistants. b) Software development, data analysis, network administration, cloud computing. c) Hardware manufacturing, system integration, network infrastructure deployment. d) Graphic design, web development, multimedia production, user interface design. 29 / 30 29. What is the role of sensors in IoT? a) Sensors are devices that collect data from the environment or from other devices and transmit it to IoT systems for processing and analysis. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 30 / 30 30. Which network topology connects devices in a closed loop, where each device is connected to exactly two other devices? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study