Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! 👍 All the best! 1 / 30 1. What role does Julia play in machine learning programming? a) Julia is a high-level, high-performance programming language for technical computing, known for its speed, simplicity, and scalability, making it suitable for machine learning tasks. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 2 / 30 2. What are the main types of machine learning? a) The main types of machine learning are supervised learning, unsupervised learning, and reinforcement learning. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 3 / 30 3. What is antivirus software? a) Software that protects computer hardware from physical damage. b) Software that prevents unauthorized access to computer systems. c) Software that detects, prevents, and removes malicious software (malware) from a computer system. d) Software used for encrypting sensitive data. 4 / 30 4. What activities are typically performed during the Design phase of the Software Development Life Cycle (SDLC)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Activities performed during the Design phase include architectural design, detailed design of system components, database design, user interface design, and creation of design documents and diagrams. d) The study of computer algorithms and data structures. 5 / 30 5. What is sequence control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 6 / 30 6. What is phishing? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) A type of malware. d) A social engineering attack where attackers attempt to deceive users into disclosing sensitive information, such as passwords or financial data. 7 / 30 7. Which network device operates at the Data Link layer of the OSI model and uses MAC addresses to forward data packets within the same network segment? a) Hub b) Switch c) Router d) Bridge 8 / 30 8. What is Artificial Intelligence (AI)? a) The study of computer algorithms and data structures. b) The development of computer systems that can perform tasks that typically require human intelligence. c) The physical components of a computer system. d) The process of securely storing data on computer systems. 9 / 30 9. What is a hyperlink? a) A type of network topology. b) A clickable element on a web page that redirects to another web page or resource. c) A protocol used for sending emails. d) A physical device used to connect computers to the internet. 10 / 30 10. How does blockchain achieve decentralization? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) By distributing transaction data across multiple computers (nodes) in a network, eliminating the need for a central authority or intermediary. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 11 / 30 11. What are some applications of robotics? a) Industrial automation, healthcare assistance, agriculture, exploration, entertainment. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 12 / 30 12. What is the Turing Test? a) A test used to evaluate the intelligence of a machine by assessing its ability to exhibit behavior indistinguishable from that of a human. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 13 / 30 13. What is a patent? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 14 / 30 14. What is exploratory data analysis (EDA) in data analytics? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Exploratory data analysis (EDA) involves exploring and visualizing data to gain insights, identify patterns, and formulate hypotheses for further analysis. 15 / 30 15. What are some ethical considerations in computing? a) Privacy, security, intellectual property rights, accessibility. b) Processor speed, memory capacity, storage capacity, network bandwidth. c) Operating system compatibility, software licensing, hardware maintenance. d) User interface design, graphic design, multimedia integration, web development. 16 / 30 16. What is a web page? a) A physical device used to connect computers to the internet. b) A single document displayed in a web browser. c) A software application used for communication between computers. d) A collection of interconnected websites. 17 / 30 17. What is descriptive analytics in data analytics? a) Descriptive analytics involves summarizing and visualizing data to understand historical trends, patterns, and relationships. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 18 / 30 18. Which programming language is known for its high-performance computing capabilities in machine learning? a) Julia is known for its high-performance computing capabilities in machine learning, making it suitable for computationally intensive tasks and large-scale datasets. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 19 / 30 19. What is copyright? a) The exclusive right granted to the creator of an original work to reproduce, distribute, and display the work. b) The legal protection of a product's unique design, name, or symbol that distinguishes it from others. c) The exclusive right granted to inventors to prevent others from making, using, or selling their invention. d) The protection of confidential information or proprietary knowledge that provides a competitive advantage. 20 / 30 20. What is iteration control structure? a) A control structure that executes a sequence of statements in a specific order, from top to bottom. b) A control structure that allows for repeated execution of a block of statements while a specified condition is true. c) A control structure that allows for making decisions and executing different code blocks based on specified conditions. d) A control structure that divides a program into separate modules or functions. 21 / 30 21. What is blockchain technology? a) A decentralized digital ledger that records transactions across multiple computers in a way that is transparent, secure, and immutable. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 22 / 30 22. What are some common types of cybercrime? a) Hacking, phishing, malware, identity theft, online fraud, cyberbullying. b) Software development, data analysis, network administration, cloud computing. c) Hardware manufacturing, system integration, network infrastructure deployment. d) Graphic design, web development, multimedia production, user interface design. 23 / 30 23. What are some common applications of Virtual Reality (VR)? a) Common applications of Virtual Reality (VR) include gaming, simulations, training and education, virtual tours, healthcare, and architectural visualization. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 24 / 30 24. Which type of network uses wireless communication technologies to connect devices within a limited area, such as a home or office building? a) Local Area Network (LAN) b) Wide Area Network (WAN) c) Wireless Local Area Network (WLAN) d) Metropolitan Area Network (MAN) 25 / 30 25. What is Augmented Reality (AR)? a) The process of securely storing data on computer systems. b) Sorting algorithms, searching algorithms, graph algorithms. c) Augmented Reality (AR) is a technology that overlays digital content and information onto the real-world environment, enhancing the user's perception and interaction with their surroundings. d) The study of computer algorithms and data structures. 26 / 30 26. What is a virus? a) A type of encryption algorithm. b) A program that self-replicates and spreads by inserting copies of itself into other programs or files. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 27 / 30 27. What is ransomware? a) A type of encryption algorithm. b) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. c) A program that self-replicates and spreads by inserting copies of itself into other programs or files. d) Malware that encrypts files or locks computer systems, demanding payment (ransom) for their release. 28 / 30 28. What are the key roles in Scrum, an Agile methodology? a) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). b) Sorting algorithms, searching algorithms, graph algorithms. c) The key roles in Scrum include the Product Owner, Scrum Master, and Development Team, each with distinct responsibilities and contributions to the Agile development process. d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 29 / 30 29. How many kilobytes are in a megabyte (MB)? a) 1000 b) 1024 c) 2048 d) 4096 30 / 30 30. What are the core values of Agile Development Methodology, as outlined in the Agile Manifesto? a) The core values of Agile Development Methodology, as outlined in the Agile Manifesto, include individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and responding to change over following a plan. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs:Click to share on Facebook (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on X (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)