Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 2 / 30 2. How many kilobytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 3 / 30 3. What are some advantages of optical disc drives? a) Long-term data retention, compatibility with a wide range of devices, and low cost. b) Portable, easy to connect, and offer high storage capacity. c) Prone to physical damage, slow data transfer rates, and high cost. d) Used primarily for temporary storage, incompatible with most computers, and low reliability. 4 / 30 4. What is an internet? a) A global network of interconnected computers and devices. b) A single computer system with multiple processing units. c) A local area network within a single building or campus. d) A protocol used for sending emails. 5 / 30 5. Which type of memory is faster but smaller in size compared to main memory, and is used to store frequently accessed data and instructions? a) RAM b) ROM c) Cache Memory d) Virtual Memory 6 / 30 6. Which type of memory is volatile and used for temporary storage of data and program instructions during the operation of a computer? a) RAM b) ROM c) Cache Memory d) Virtual Memory 7 / 30 7. What is a Merkle tree in blockchain technology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A data structure used to efficiently store and verify the integrity of transactions in a block by organizing them into a hierarchical tree structure of cryptographic hashes. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 8 / 30 8. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 9 / 30 9. Which type of network is designed to connect devices within a specific metropolitan area, such as a city or town? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 10 / 30 10. What is unsupervised learning in machine learning? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Unsupervised learning is a type of machine learning where the algorithm learns from unlabeled data, identifying patterns, structures, or relationships without guidance. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 11 / 30 11. What is a patent? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 12 / 30 12. What is a Git branch, and how is it used in version control? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) A Git branch is a lightweight movable pointer to a commit in the commit history, representing an independent line of development with its own set of changes and history, enabling parallel development, isolation of changes, and experimentation without affecting the main codebase. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. Which network device operates at the Network layer of the OSI model and forwards data packets between different networks based on IP addresses? a) Hub b) Switch c) Router d) Bridge 14 / 30 14. Which type of memory is used to expand the effective size of the main memory by using a portion of the hard disk as an extension? a) RAM b) ROM c) Cache Memory d) Virtual Memory 15 / 30 15. Which type of memory is used to temporarily store frequently accessed data and instructions to speed up the performance of the CPU? a) RAM b) ROM c) Cache Memory d) Virtual Memory 16 / 30 16. How does blockchain achieve decentralization? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) By distributing transaction data across multiple computers (nodes) in a network, eliminating the need for a central authority or intermediary. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 17 / 30 17. What is encryption key? a) A physical key used to lock and unlock computer hardware. b) A cryptographic algorithm used for data encryption. c) A secret value used in encryption and decryption processes to secure data. d) A type of malware. 18 / 30 18. What are neural networks? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) A type of machine learning algorithm inspired by the structure and function of the human brain, consisting of interconnected nodes (neurons) organized in layers. 19 / 30 19. What are some potential ethical challenges and risks associated with the use of artificial intelligence (AI) in decision-making processes? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Some potential ethical challenges and risks associated with the use of artificial intelligence (AI) in decision-making processes include biases and discrimination, lack of transparency and explainability, privacy infringements and surveillance, job displacement and automation, accountability and liability issues, and societal impact and human welfare concerns. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 20 / 30 20. What are conditional statements? a) Statements that are executed in a specific sequence regardless of any conditions. b) Statements that control the flow of execution in a program based on specified conditions or criteria. c) Statements used for declaring variables in a program. d) The process of executing a program. 21 / 30 21. What are some features of Microsoft Word? a) Spell check, grammar check, and formatting options. b) Web browsing and email functionality. c) Video editing and graphic design tools. d) Gaming and entertainment features. 22 / 30 22. Which network topology provides redundant paths between devices, offering increased reliability and fault tolerance? a) Bus Topology b) Star Topology c) Ring Topology d) Mesh Topology 23 / 30 23. What types of identifiers can be protected as trademarks? a) Words, logos, symbols, slogans, or combinations thereof used to represent goods or services in commerce. b) New and useful inventions, processes, methods, or compositions of matter. c) Literary works, artistic works, musical works, dramatic works, and other creative expressions. d) Ideas, concepts, facts, and theories. 24 / 30 24. What is intellectual property? a) The physical components of a computer system. b) Software applications used for managing computer hardware. c) The rights granted to individuals or organizations to control the use and distribution of their creative works, inventions, and discoveries. d) The study of computer algorithms and data structures. 25 / 30 25. What are some common data preprocessing techniques? a) Common data preprocessing techniques include data cleaning, data transformation, feature engineering, and dimensionality reduction. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 26 / 30 26. What role does the Product Owner play in Agile Development Methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The Product Owner is responsible for representing the interests of the stakeholders, defining and prioritizing the product backlog, and ensuring that the development team delivers value to the customer. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 27 / 30 27. What is edge computing in the context of IoT? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The practice of processing and analyzing data closer to its source or origin, typically at the edge of the network, rather than relying solely on centralized cloud servers. d) The physical components of a computer system. 28 / 30 28. How does the choice of programming language impact machine learning projects? a) The choice of programming language impacts machine learning projects in terms of development productivity, performance, availability of libraries and tools, community support, and integration with other technologies. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 29 / 30 29. What is the purpose of a Git commit message? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The purpose of a Git commit message is to provide a concise and descriptive summary of the changes made in a commit, helping developers and collaborators understand the purpose, scope, and impact of the changes and facilitating code review, collaboration, and project maintenance. 30 / 30 30. What is the concept of smart cities in IoT? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The integration of IoT technologies to enhance the efficiency, sustainability, and livability of urban environments. d) The physical components of a computer system. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs:Click to share on Facebook (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on X (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)