Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get fresh, new questions in each attempt. Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 2 / 30 2. What is feature engineering in machine learning? a) Feature engineering is the process of selecting, transforming, or creating new features from raw data to improve the performance of machine learning models. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 3 / 30 3. What is programming logic? a) The process of writing code in a programming language. b) The systematic approach to problem-solving using logical and computational thinking. c) The hardware components of a computer system. d) The process of designing user interfaces for software applications. 4 / 30 4. What is unsupervised learning? a) Learning from labeled data with input-output pairs to make predictions or classifications. b) Learning from unlabeled data to discover patterns or structures. c) Learning through interaction with an environment to maximize rewards. d) The study of computer algorithms and data structures. 5 / 30 5. What is Agile Development Methodology? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Agile Development Methodology is an iterative and incremental approach to software development that emphasizes flexibility, collaboration, and customer feedback throughout the development process. d) The study of computer algorithms and data structures. 6 / 30 6. How many megabytes are in a terabyte (TB)? a) 1,024 b) 1,048,576 c) 1,073,741,824 d) 1,099,511,627,776 7 / 30 7. What are some key principles of privacy protection in the context of cybersecurity regulations? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Some key principles of privacy protection in the context of cybersecurity regulations include data minimization, consent and user control, transparency and accountability, security safeguards and encryption, data breach notification, and cross-border data transfers. 8 / 30 8. What is a hyperlink? a) A type of network topology. b) A clickable element on a web page that redirects to another web page or resource. c) A protocol used for sending emails. d) A physical device used to connect computers to the internet. 9 / 30 9. What is a Database Management System (DBMS)? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) A software system that enables users to create, manage, and access databases efficiently, providing features for data storage, retrieval, manipulation, and security. 10 / 30 10. What are the key principles of Agile Development Methodology? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) The key principles of Agile Development Methodology include customer collaboration, responding to change, delivering working software, self-organizing teams, and regular reflection and adaptation. 11 / 30 11. What is the purpose of a README file in software development projects? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The purpose of a README file is to provide essential information about the project, including its purpose, features, installation instructions, usage guidelines, contribution guidelines, and contact information, serving as a comprehensive guide for developers, users, and collaborators. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. What are some potential ethical challenges and risks associated with the use of artificial intelligence (AI) in decision-making processes? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) Some potential ethical challenges and risks associated with the use of artificial intelligence (AI) in decision-making processes include biases and discrimination, lack of transparency and explainability, privacy infringements and surveillance, job displacement and automation, accountability and liability issues, and societal impact and human welfare concerns. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What are some common algorithms used in unsupervised learning? a) Common algorithms used in unsupervised learning include k-means clustering, hierarchical clustering, principal component analysis (PCA), and autoencoders. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 14 / 30 14. What is the difference between narrow AI and general AI? a) Narrow AI is focused on performing specific tasks or solving specific problems, while general AI aims to exhibit human-like intelligence and cognitive abilities across a wide range of tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 15 / 30 15. What are some examples of multimedia software? a) Windows Media Player, VLC Media Player, iTunes. b) Adobe Photoshop, Adobe Illustrator, CorelDRAW. c) Microsoft Word, Google Docs, Microsoft Excel. d) Microsoft PowerPoint, Google Slides, Apple Keynote. 16 / 30 16. What is the role of data visualization in data analytics? a) Data visualization involves representing data visually through charts, graphs, and dashboards to facilitate understanding, interpretation, and communication of insights. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 17 / 30 17. What are some applications of computer vision? a) Object detection, image classification, facial recognition, autonomous vehicles, medical imaging. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 18 / 30 18. What is a Git merge, and how does it work in version control? a) Git merge is a version control operation that combines changes from one branch into another, integrating new features, bug fixes, or changes made in a feature branch back into the main branch or another target branch, preserving the commit history and resolving conflicts if necessary. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 19 / 30 19. What is the process of mining in blockchain technology? a) Mining is the process of validating and adding new transactions to the blockchain through cryptographic puzzle-solving, typically rewarded with cryptocurrency incentives. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 20 / 30 20. Which of the following is NOT a type of optical disc? a) CD (Compact Disc) b) DVD (Digital Versatile Disc) c) SSD (Solid State Drive) d) Blu-ray Disc 21 / 30 21. How many megabytes are in a gigabyte (GB)? a) 1000 b) 1024 c) 2048 d) 4096 22 / 30 22. What is the future of machine learning programming languages? a) The future of machine learning programming languages is expected to involve continued innovation, development of specialized languages and tools, and integration with emerging technologies such as quantum computing and edge computing. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 23 / 30 23. Which of the following is NOT a type of computer network based on geographical scope? a) Local Area Network (LAN) b) Metropolitan Area Network (MAN) c) Personal Area Network (PAN) d) Wide Area Network (WAN) 24 / 30 24. What is prescriptive analytics in data analytics? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Prescriptive analytics involves providing recommendations and decision support based on insights derived from descriptive and predictive analytics. d) The study of computer algorithms and data structures. 25 / 30 25. What is a cooling pad? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 26 / 30 26. What is reinforcement learning in machine learning? a) Reinforcement learning is a type of machine learning where the algorithm learns through trial and error by interacting with an environment, receiving feedback or rewards based on its actions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 27 / 30 27. What is overfitting in machine learning? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Overfitting occurs when a machine learning model learns to capture noise or random fluctuations in the training data, resulting in poor generalization to new, unseen data. d) The study of computer algorithms and data structures. 28 / 30 28. How does the choice of programming language affect the scalability of machine learning projects? a) The study of computer algorithms and data structures. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The choice of programming language can affect the scalability of machine learning projects by influencing factors such as performance, concurrency, and support for distributed computing. 29 / 30 29. Which network device operates at the Physical layer of the OSI model and forwards data packets between different network segments? a) Hub b) Switch c) Router d) Bridge 30 / 30 30. What is pseudocode? a) A programming language used for writing code. b) A type of malware. c) A high-level description of a computer program or algorithm using natural language and simple syntax. d) The process of executing a program. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study