Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What activities are typically performed during the Design phase of the Software Development Life Cycle (SDLC)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Activities performed during the Design phase include architectural design, detailed design of system components, database design, user interface design, and creation of design documents and diagrams. d) The study of computer algorithms and data structures. 2 / 30 2. How many bytes are in a kilobyte (KB)? a) 100 b) 1024 c) 2048 d) 4096 3 / 30 3. What is the role of connectivity in IoT? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) Connectivity enables IoT devices to exchange data and communicate with each other and the internet, forming a networked ecosystem. 4 / 30 4. What is the Internet of Things (IoT)? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A network of interconnected devices embedded with sensors, software, and other technologies to exchange data and communicate with each other and the internet. d) The physical components of a computer system. 5 / 30 5. What is the principle of privacy by design, and how does it apply to software development? a) Privacy by design is a principle that advocates for embedding privacy and data protection considerations into the design, development, and implementation of software systems and applications from the outset, ensuring that privacy-enhancing features and safeguards are integrated into the core architecture and functionality of the software. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 6 / 30 6. What is the purpose of a Git commit message? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The purpose of a Git commit message is to provide a concise and descriptive summary of the changes made in a commit, helping developers and collaborators understand the purpose, scope, and impact of the changes and facilitating code review, collaboration, and project maintenance. 7 / 30 7. What is SVN (Subversion), and how does it differ from Git? a) SVN (Subversion) is a centralized version control system (CVCS) that uses a central repository to store project history, requiring developers to be online to access and commit changes, while Git is a distributed version control system (DVCS) that allows each developer to have a complete copy of the repository on their local machine, enabling offline and independent work. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 8 / 30 8. What is asymmetric encryption? a) An encryption method that uses different keys for encryption and decryption. b) An encryption method that uses the same key for both encryption and decryption. c) A type of encryption algorithm. d) A security mechanism used to protect against unauthorized access to computer systems. 9 / 30 9. What is Git, and how does it differ from other Version Control Systems (VCS)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Git is a distributed version control system (DVCS) that allows developers to work offline and independently, with each user having a complete copy of the repository on their local machine, enabling faster operations, branching, and merging compared to centralized VCS like SVN. d) The study of computer algorithms and data structures. 10 / 30 10. What are some examples of video editing software? a) Adobe Premiere Pro, Final Cut Pro, Sony Vegas Pro. b) Microsoft Word, Google Docs, Microsoft Excel. c) Windows Media Player, VLC Media Player, iTunes. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 11 / 30 11. How do cybersecurity regulations help mitigate cyber threats and protect critical infrastructure? a) Cybersecurity regulations help mitigate cyber threats and protect critical infrastructure by establishing legal requirements, standards, and guidelines for implementing robust cybersecurity measures, practices, and controls to safeguard essential services, systems, and networks from cyber attacks, intrusions, and disruptions, ensuring the resilience, reliability, and availability of critical infrastructure assets, protecting public safety, national security, and economic stability, and promoting collaboration, information sharing, and coordination among government agencies, regulatory authorities, industry stakeholders, and cybersecurity experts to address emerging cyber threats and vulnerabilities effectively. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. What are data types? a) Categories of programming languages. b) A fixed set of values and operations that can be performed on them in a programming language. c) The process of executing a program. d) A type of malware. 13 / 30 13. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 14 / 30 14. How does blockchain achieve decentralization? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) By distributing transaction data across multiple computers (nodes) in a network, eliminating the need for a central authority or intermediary. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What is the purpose of intellectual property rights (IPR) in the field of technology and innovation? a) The purpose of intellectual property rights (IPR) in the field of technology and innovation is to incentivize and reward innovation, creativity, and investment in research and development by granting legal protections and exclusive rights to creators, inventors, and innovators for their inventions, designs, trademarks, and creative works, encouraging the dissemination of knowledge, fostering economic growth, and promoting competition and fair trade. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 16 / 30 16. What is the process of mining in blockchain technology? a) Mining is the process of validating and adding new transactions to the blockchain through cryptographic puzzle-solving, typically rewarded with cryptocurrency incentives. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. Which programming language is known for its simplicity and readability in machine learning? a) Sorting algorithms, searching algorithms, graph algorithms. b) Python is known for its simplicity and readability in machine learning, making it accessible for beginners and experts alike. c) The study of computer algorithms and data structures. d) The process of securely storing data on computer systems. 18 / 30 18. Which type of network is suitable for connecting branch offices of a multinational corporation located in different countries? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 19 / 30 19. What is CPU architecture? a) The physical design and layout of a central processing unit (CPU). b) The process of executing instructions in a program. c) A type of programming language. d) The software used for managing computer hardware. 20 / 30 20. Which network component helps to extend the range of a wireless network and provides wireless connectivity to devices such as laptops and smartphones? a) Router b) Switch c) Modem d) Access Point 21 / 30 21. What is antivirus software? a) Software that protects computer hardware from physical damage. b) Software that prevents unauthorized access to computer systems. c) Software that detects, prevents, and removes malicious software (malware) from a computer system. d) Software used for encrypting sensitive data. 22 / 30 22. What is the World Wide Web (WWW)? a) A network of interconnected websites and web pages. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 23 / 30 23. What is computer vision? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A subset of AI that focuses on analyzing and interpreting visual information from images or videos. d) The physical components of a computer system. 24 / 30 24. Which type of network is designed to connect devices within a specific metropolitan area, such as a city or town? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 25 / 30 25. What is security in computing? a) The process of securely storing data on computer systems. b) The protection of computer systems and data from threats, such as viruses, hackers, and cyber attacks. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 26 / 30 26. What are some common data preprocessing techniques? a) Common data preprocessing techniques include data cleaning, data transformation, feature engineering, and dimensionality reduction. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 27 / 30 27. What is a Trojan horse? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware disguised as legitimate software that appears harmless but contains malicious code that performs unauthorized actions when executed. 28 / 30 28. What types of works are protected by copyright? a) Literary works, artistic works, musical works, dramatic works, and other creative expressions fixed in a tangible medium of expression. b) Inventions, processes, methods, and discoveries. c) Logos, symbols, names, and slogans used to identify and distinguish products or services. d) Ideas, concepts, facts, and theories. 29 / 30 29. What is natural language processing (NLP)? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) A subset of AI that focuses on understanding and generating human language. d) The physical components of a computer system. 30 / 30 30. Which technology overlays digital content onto the real-world environment in Augmented Reality (AR)? a) Augmented Reality (AR) overlays digital content onto the real-world environment using technologies such as smartphones, tablets, AR glasses, and head-up displays (HUDs). b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study