Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. Which network device operates at the Network layer of the OSI model and forwards data packets between different networks based on IP addresses? a) Hub b) Switch c) Router d) Bridge 2 / 30 2. What are some examples of multimedia software? a) Windows Media Player, VLC Media Player, iTunes. b) Adobe Photoshop, Adobe Illustrator, CorelDRAW. c) Microsoft Word, Google Docs, Microsoft Excel. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 3 / 30 3. What is a Trojan horse? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware disguised as legitimate software that appears harmless but contains malicious code that performs unauthorized actions when executed. 4 / 30 4. Which network topology provides redundant paths between devices, offering increased reliability and fault tolerance? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 5 / 30 5. What is a Merkle tree in blockchain technology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A data structure used to efficiently store and verify the integrity of transactions in a block by organizing them into a hierarchical tree structure of cryptographic hashes. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 6 / 30 6. What is a password? a) A physical device used for user authentication. b) A secret combination of characters used for user authentication to access a computer system or account. c) A type of encryption algorithm. d) A type of malware. 7 / 30 7. What are some advantages of external hard drives? a) Portable, easy to connect, and offer high storage capacity. b) Fixed in place, difficult to connect, and offer limited storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 8 / 30 8. What is a website? a) A physical device used to connect computers to the internet. b) A collection of networked computers sharing resources. c) A software application used for communication between computers. d) A collection of web pages accessible via the World Wide Web. 9 / 30 9. What is the decimal equivalent of the binary number 100110? a) 38 b) 42 c) 46 d) 50 10 / 30 10. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 11 / 30 11. What is the role of data visualization in data analytics? a) Data visualization involves representing data visually through charts, graphs, and dashboards to facilitate understanding, interpretation, and communication of insights. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 12 / 30 12. What are the advantages of Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) The advantages of Agile Development Methodology include increased flexibility, faster time-to-market, improved customer satisfaction, better quality software, and enhanced team collaboration and morale. d) The study of computer algorithms and data structures. 13 / 30 13. What is unsupervised learning in machine learning? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Unsupervised learning is a type of machine learning where the algorithm learns from unlabeled data, identifying patterns, structures, or relationships without guidance. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 14 / 30 14. What is the future of machine learning programming languages? a) The future of machine learning programming languages is expected to involve continued innovation, development of specialized languages and tools, and integration with emerging technologies such as quantum computing and edge computing. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What is an external hard drive? a) A storage device located inside the computer case used for storing data. b) A software application used for managing computer hardware. c) A device connected to a computer externally for storing data, typically using a USB or Thunderbolt interface. d) A type of optical disc used for storing data. 16 / 30 16. What are some features of Microsoft PowerPoint? a) Slide templates, animations, transitions, and multimedia integration. b) Web browsing and email functionality. c) Video editing and graphic design tools. d) Gaming and entertainment features. 17 / 30 17. What are the primary functions of registers in the memory hierarchy? a) To provide temporary storage for data and instructions that are currently being processed by the CPU. b) To store frequently accessed data and instructions to speed up processing. c) To provide long-term storage for data and instructions. d) To manage communication between the CPU and other components of the computer system. 18 / 30 18. What is a cooling pad? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 19 / 30 19. What is encryption key? a) A physical key used to lock and unlock computer hardware. b) A cryptographic algorithm used for data encryption. c) A secret value used in encryption and decryption processes to secure data. d) A type of malware. 20 / 30 20. Why is cybersecurity important? a) To ensure compliance with legal regulations and industry standards. b) To prevent unauthorized access, protect sensitive information, and safeguard against cyber threats. c) To improve the efficiency and performance of computer systems. d) To enhance the aesthetics and user experience of software applications. 21 / 30 21. What are some strategies for addressing biases and promoting fairness in artificial intelligence (AI) algorithms and decision-making systems? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some strategies for addressing biases and promoting fairness in artificial intelligence (AI) algorithms and decision-making systems include data preprocessing and cleaning, algorithmic fairness and bias mitigation techniques, diversity and inclusion in dataset collection and model training, transparency and explainability in AI systems, human oversight and accountability mechanisms, and ongoing monitoring and evaluation of AI systems for bias detection and correction. 22 / 30 22. What is the binary representation of the decimal number 63? a) 110011 b) 111111 c) 100101 d) 101011 23 / 30 23. What are the key differences between copyright, patent, and trademark as forms of intellectual property protection? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Copyright protects original works of authorship, such as literary, artistic, and musical creations, providing creators with exclusive rights to reproduce, distribute, perform, and display their works, while patents protect inventions, innovations, and technological advancements, granting inventors exclusive rights to exploit, manufacture, and commercialize their inventions for a limited period, and trademarks protect brands, logos, and symbols used to distinguish goods and services in the marketplace, providing owners with exclusive rights to use, license, and protect their distinctive marks from unauthorized use or infringement by others. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 24 / 30 24. What is privacy in computing? a) The process of securely storing data on computer systems. b) The protection of personal information and data from unauthorized access or disclosure. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 25 / 30 25. Which of the following is NOT a type of computer network based on geographical scope? a) Local Area Network (LAN) b) Metropolitan Area Network (MAN) c) Personal Area Network (PAN) d) Wide Area Network (WAN) 26 / 30 26. Which type of memory is directly accessed by the CPU for storing and retrieving data and instructions during program execution? a) RAM b) ROM c) Cache Memory d) Virtual Memory 27 / 30 27. What is reinforcement learning in machine learning? a) Reinforcement learning is a type of machine learning where the algorithm learns through trial and error by interacting with an environment, receiving feedback or rewards based on its actions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 28 / 30 28. Which of the following is NOT a type of optical disc? a) CD (Compact Disc) b) DVD (Digital Versatile Disc) c) SSD (Solid State Drive) d) Blu-ray Disc 29 / 30 29. What are some common types of game controllers? a) Gamepads, joysticks, steering wheels, motion controllers. b) Keyboards, mice, touchpads, styluses. c) Webcams, scanners, printers, microphones. d) Monitors, speakers, headphones, projectors. 30 / 30 30. What is programming logic? a) The process of writing code in a programming language. b) The systematic approach to problem-solving using logical and computational thinking. c) The hardware components of a computer system. d) The process of designing user interfaces for software applications. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs: Click to share on Facebook (Opens in new window) Facebook Click to share on WhatsApp (Opens in new window) WhatsApp Click to share on X (Opens in new window) X Click to share on LinkedIn (Opens in new window) LinkedIn Click to share on Reddit (Opens in new window) Reddit