Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is a Git merge, and how does it work in version control? a) Git merge is a version control operation that combines changes from one branch into another, integrating new features, bug fixes, or changes made in a feature branch back into the main branch or another target branch, preserving the commit history and resolving conflicts if necessary. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 2 / 30 2. How do cybersecurity regulations help mitigate cyber threats and protect critical infrastructure? a) Cybersecurity regulations help mitigate cyber threats and protect critical infrastructure by establishing legal requirements, standards, and guidelines for implementing robust cybersecurity measures, practices, and controls to safeguard essential services, systems, and networks from cyber attacks, intrusions, and disruptions, ensuring the resilience, reliability, and availability of critical infrastructure assets, protecting public safety, national security, and economic stability, and promoting collaboration, information sharing, and coordination among government agencies, regulatory authorities, industry stakeholders, and cybersecurity experts to address emerging cyber threats and vulnerabilities effectively. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 3 / 30 3. Which network component operates at the Physical layer of the OSI model and simply repeats incoming signals to all connected devices? a) Router b) Switch c) Modem d) Hub 4 / 30 4. What are some common uses of scanners? a) Digitizing documents, photos, artwork, and other printed materials. b) Recording audio, editing videos, creating graphics. c) Playing video games, controlling drones, capturing virtual reality content. d) Video conferencing, live streaming, online gaming. 5 / 30 5. Which network topology connects devices in a closed loop, where each device is connected to exactly two other devices? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 6 / 30 6. What is symmetric encryption? a) An encryption method that uses different keys for encryption and decryption. b) An encryption method that uses the same key for both encryption and decryption. c) A type of encryption algorithm. d) A security mechanism used to protect against unauthorized access to computer systems. 7 / 30 7. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 8 / 30 8. What are the key principles of Agile Development Methodology? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The key principles of Agile Development Methodology include customer collaboration, responding to change, delivering working software, self-organizing teams, and regular reflection and adaptation. 9 / 30 9. What is a game controller? a) A device used for capturing images and videos of scenes or individuals. b) A device used for scanning printed text and converting it into digital format. c) A device used for controlling video games and simulations. d) A device used for storing data externally. 10 / 30 10. What is the Internet? a) A global network of interconnected computers and devices. b) A software application used for communication between computers. c) A physical device used to connect computers to the internet. d) A type of network topology. 11 / 30 11. What are some examples of AI applications? a) Natural language processing, computer vision, robotics, autonomous vehicles, virtual assistants. b) Software development, data analysis, network administration, cloud computing. c) Hardware manufacturing, system integration, network infrastructure deployment. d) Graphic design, web development, multimedia production, user interface design. 12 / 30 12. What are the primary functions of cache memory in the memory hierarchy? a) To provide temporary storage for data and instructions that are currently being processed by the CPU. b) To store frequently accessed data and instructions to speed up processing. c) To provide long-term storage for data and instructions. d) To manage communication between the CPU and other components of the computer system. 13 / 30 13. What types of identifiers can be protected as trademarks? a) Words, logos, symbols, slogans, or combinations thereof used to represent goods or services in commerce. b) New and useful inventions, processes, methods, or compositions of matter. c) Literary works, artistic works, musical works, dramatic works, and other creative expressions. d) Ideas, concepts, facts, and theories. 14 / 30 14. What is the purpose of intellectual property rights (IPR) in the field of technology and innovation? a) The purpose of intellectual property rights (IPR) in the field of technology and innovation is to incentivize and reward innovation, creativity, and investment in research and development by granting legal protections and exclusive rights to creators, inventors, and innovators for their inventions, designs, trademarks, and creative works, encouraging the dissemination of knowledge, fostering economic growth, and promoting competition and fair trade. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What is model evaluation in machine learning? a) Model evaluation is the process of assessing the performance and generalization ability of machine learning models using evaluation metrics and validation techniques. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 16 / 30 16. What is feature engineering in machine learning? a) Feature engineering is the process of selecting, transforming, or creating new features from raw data to improve the performance of machine learning models. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 17 / 30 17. What is the purpose of a README file in software development projects? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The purpose of a README file is to provide essential information about the project, including its purpose, features, installation instructions, usage guidelines, contribution guidelines, and contact information, serving as a comprehensive guide for developers, users, and collaborators. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. Which type of network covers a small geographical area, typically within a single building or campus? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 19 / 30 19. Which type of memory is typically faster than secondary storage but slower than cache memory and main memory? a) RAM b) ROM c) Cache Memory d) Virtual Memory 20 / 30 20. Which type of memory is used to temporarily store frequently accessed data and instructions to speed up the performance of the CPU? a) RAM b) ROM c) Cache Memory d) Virtual Memory 21 / 30 21. What are some examples of graphics software? a) Adobe Photoshop, Adobe Illustrator, CorelDRAW. b) Microsoft Word, Google Docs, Microsoft Excel. c) Windows Media Player, VLC Media Player, QuickTime Player. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 22 / 30 22. What is a firewall? a) A physical barrier around a computer system. b) A software or hardware-based security system that monitors and controls incoming and outgoing network traffic. c) A type of malware. d) A cryptographic algorithm used for data encryption. 23 / 30 23. What is the role of R in machine learning? a) R is a programming language and environment for statistical computing and graphics, commonly used for data analysis, visualization, and statistical modeling in machine learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 24 / 30 24. What are the main types of machine learning? a) The main types of machine learning are supervised learning, unsupervised learning, and reinforcement learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 25 / 30 25. What is encryption key? a) A physical key used to lock and unlock computer hardware. b) A cryptographic algorithm used for data encryption. c) A secret value used in encryption and decryption processes to secure data. d) A type of malware. 26 / 30 26. What are some examples of IoT applications in healthcare? a) Remote patient monitoring, wearable health trackers, smart medical devices, telemedicine. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What is programming logic? a) The process of writing code in a programming language. b) The systematic approach to problem-solving using logical and computational thinking. c) The hardware components of a computer system. d) The process of designing user interfaces for software applications. 28 / 30 28. What is a Git remote, and how is it used in version control? a) A Git remote is a reference to a remote repository hosted on a server or another location, enabling developers to push and pull changes between local and remote repositories, collaborate with distributed teams, and synchronize project updates. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 29 / 30 29. How many bytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 30 / 30 30. What is the binary representation of the decimal number 15? a) 1111 b) 1010 c) 1101 d) 1001 Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study