Home» Online Test » Computer » Computer Fundamentals Online Test 0% Sorry, time's up. To complete the online test, please restart it. Created by Vikash chaudhary This 'Computer Fundamentals Online Test' covers questions across all the topics related to Computers from basic to advanced levels. Get New Questions in Each Attempt Total Questions: 30 Time Allotted: 30 minutes Passing Score: 50% Randomization: Yes Certificate: Yes Do not refresh the page! All the best! 1 / 30 1. What is the role of cryptography in blockchain technology? a) Cryptography is used to secure transactions and data on the blockchain, ensuring confidentiality, integrity, and authenticity. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 2 / 30 2. What is data analytics? a) Data analytics is the process of analyzing, interpreting, and visualizing data to extract actionable insights and make informed decisions. b) Sorting algorithms, searching algorithms, graph algorithms. c) The process of securely storing data on computer systems. d) The study of computer algorithms and data structures. 3 / 30 3. What is multimedia software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for playing multimedia files, such as audio and video. c) Software used for managing computer networks and resources. d) Software used for word processing and document creation. 4 / 30 4. What is a web page? a) A physical device used to connect computers to the internet. b) A single document displayed in a web browser. c) A software application used for communication between computers. d) A collection of interconnected websites. 5 / 30 5. What is accessibility in computing? a) The protection of personal information and data from unauthorized access or disclosure. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) The design and implementation of technology to ensure equal access and usability for individuals with disabilities. 6 / 30 6. What is the goal of AI in robotics? a) To create robots that can perform tasks more efficiently and effectively than humans. b) The process of securely storing data on computer systems. c) The study of computer algorithms and data structures. d) To develop robots with human-like intelligence and consciousness. 7 / 30 7. What are registers in the memory hierarchy? a) The fastest and smallest type of computer memory located within the CPU. b) The largest and slowest type of computer memory used for long-term storage. c) A type of programming language. d) The software used for managing computer hardware. 8 / 30 8. Which of the following is NOT a type of optical disc? a) CD (Compact Disc) b) DVD (Digital Versatile Disc) c) SSD (Solid State Drive) d) Blu-ray Disc 9 / 30 9. Which technology is used to create immersive virtual experiences in Virtual Reality (VR)? a) Virtual Reality (VR) uses a combination of technologies such as head-mounted displays (HMDs), motion tracking sensors, haptic feedback devices, and immersive audio systems to create immersive virtual experiences. b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). 10 / 30 10. What is malware? a) A type of encryption algorithm. b) A security mechanism used to protect against unauthorized access to computer systems. c) Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. d) A physical device used for user authentication. 11 / 30 11. What is a UPS (Uninterruptible Power Supply)? a) A device used for capturing images and videos of scenes or individuals. b) A device used for protecting computer systems from power surges and outages by providing backup power. c) A device used for cooling computer systems and preventing overheating. d) A device used for controlling video games and simulations. 12 / 30 12. What are input devices? a) Devices used for outputting data from a computer system. b) Devices used for connecting to a network. c) Devices used for entering data and commands into a computer system. d) Devices used for storing data externally. 13 / 30 13. What is a hyperlink? a) A type of network topology. b) A clickable element on a web page that redirects to another web page or resource. c) A protocol used for sending emails. d) A physical device used to connect computers to the internet. 14 / 30 14. What are some common algorithms used in supervised learning? a) CPU (Central Processing Unit), RAM (Random Access Memory), HDD (Hard Disk Drive), SSD (Solid State Drive). b) Sorting algorithms, searching algorithms, graph algorithms. c) TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), SSL/TLS (Secure Sockets Layer/Transport Layer Security). d) Common algorithms used in supervised learning include linear regression, logistic regression, decision trees, random forests, support vector machines (SVM), and neural networks. 15 / 30 15. What are some common uses of scanners? a) Digitizing documents, photos, artwork, and other printed materials. b) Recording audio, editing videos, creating graphics. c) Playing video games, controlling drones, capturing virtual reality content. d) Video conferencing, live streaming, online gaming. 16 / 30 16. What is asymmetric encryption? a) An encryption method that uses different keys for encryption and decryption. b) An encryption method that uses the same key for both encryption and decryption. c) A type of encryption algorithm. d) A security mechanism used to protect against unauthorized access to computer systems. 17 / 30 17. What are the primary functions of the Control Unit (CU)? a) To perform arithmetic and logical operations on data. b) To fetch instructions from memory, decode them, and execute them. c) To temporarily store data and instructions. d) To manage communication between the CPU and other components of the computer system. 18 / 30 18. What is video editing software? a) Software used for creating, editing, and manipulating visual images or graphics. b) Software used for playing multimedia files, such as audio and video. c) Software used for managing computer networks and resources. d) Software used for editing and enhancing video recordings. 19 / 30 19. What types of identifiers can be protected as trademarks? a) Words, logos, symbols, slogans, or combinations thereof used to represent goods or services in commerce. b) New and useful inventions, processes, methods, or compositions of matter. c) Literary works, artistic works, musical works, dramatic works, and other creative expressions. d) Ideas, concepts, facts, and theories. 20 / 30 20. Which network component connects multiple networks together and forwards data packets between them based on IP addresses? a) Router b) Switch c) Modem d) Hub 21 / 30 21. Which network component is typically used in Ethernet networks to provide multiple ports for connecting devices within the same network segment? a) Router b) Switch c) Modem d) Hub 22 / 30 22. How many kilobytes are in a gigabyte (GB)? a) 1,048,576 b) 1,024,000 c) 1,000,000 d) 1,024 23 / 30 23. What is cybersecurity? a) The process of securely storing data on computer systems. b) The protection of computer systems and networks from cyber threats, such as hackers, malware, and data breaches. c) The study of computer algorithms and data structures. d) The physical components of a computer system. 24 / 30 24. What is the Arithmetic Logic Unit (ALU) in a CPU? a) The component of the CPU responsible for performing arithmetic and logical operations on data. b) The component of the CPU responsible for fetching instructions from memory, decoding them, and executing them. c) The component of the CPU responsible for temporarily storing data and instructions. d) The component of the CPU responsible for managing communication between the CPU and other components of the computer system. 25 / 30 25. What is symmetric encryption? a) An encryption method that uses different keys for encryption and decryption. b) An encryption method that uses the same key for both encryption and decryption. c) A type of encryption algorithm. d) A security mechanism used to protect against unauthorized access to computer systems. 26 / 30 26. What are some common uses of speakers? a) Video conferencing, live streaming, online gaming. b) Scanning printed documents, capturing images of physical objects. c) Recording audio, editing videos, creating graphics. d) Listening to music, watching movies, playing video games. 27 / 30 27. Which network component is essential for connecting a computer to the internet over a DSL, cable, or fiber-optic connection? a) Router b) Switch c) Modem d) Hub 28 / 30 28. What is the concept of smart cities in IoT? a) The process of securely storing data on computer systems. b) The study of computer algorithms and data structures. c) The integration of IoT technologies to enhance the efficiency, sustainability, and livability of urban environments. d) The physical components of a computer system. 29 / 30 29. What is Google Sheets? a) A search engine developed by Google. b) A cloud-based spreadsheet software developed by Google for creating, organizing, and collaborating on spreadsheets online. c) An email service developed by Google. d) A social media platform developed by Google. 30 / 30 30. What are the primary functions of registers in the memory hierarchy? a) To provide temporary storage for data and instructions that are currently being processed by the CPU. b) To store frequently accessed data and instructions to speed up processing. c) To provide long-term storage for data and instructions. d) To manage communication between the CPU and other components of the computer system. Please provide accurate information so we can send your Achievement Certificate by mail. NameEmailPhone Number Your score is Share your achievement! LinkedIn Facebook Twitter 0% Restart Test Please provide your feedback. Thank you for your valuable feedback. Send feedback Buy Computer Fundamentals MCQ PDF for Offline Study Share the above MCQs:Click to share on Facebook (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on X (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)