Computer Basics Test 3

Copied!

Online Computer Basics Test 3 for different Competitive Exams, Entrance Tests & Job Interviews. Test yourself. Take various online tests and find out how well you score before appearing in your upcoming interviews and written tests.

Instructions

Welcome to our FREE online test. Beware of anyone asking for money to take this test.

Total questions: 20

Time limit: 30 minutes

Each question is worth 1 point, and there are no penalties for wrong answers.

DO NOT refresh the page.

Good luck!

Time remaining: 30:00
1. What is the purpose of an IP address in computer networking?
  1. To identify the brand of the computer
  2. To uniquely identify a device on a network
  3. To determine the operating system of the computer
  4. To specify the type of data transmission
2. Scenario-Based: Rahul wants to securely access his office network from home. Which technology should he use to establish a secure connection?
  1. HTTP
  2. VPN (Virtual Private Network)
  3. FTP
  4. IPsec
3. Which programming language is primarily used for developing mobile applications for the Android platform?
  1. C++
  2. Java
  3. Python
  4. Swift
4. Assertion (A): Ethernet and Wi-Fi are examples of network topologies.
Reason (R): Network topologies define the physical layout of network devices.
  1. Both A and R are true, and R is the correct explanation of A
  2. Both A and R are true, but R is not the correct explanation of A
  3. A is true, but R is false
  4. A is false, but R is true
5. Which of the following is NOT a primary function of an operating system?
  1. Memory management
  2. File management
  3. Process management
  4. Network routing
6. What is the purpose of a compiler in programming?
  1. To execute the code line by line
  2. To debug the code
  3. To translate high-level programming languages into machine code
  4. To manage memory allocation
7. Arrange the following computer storage units in ascending order of their capacity:
  1. Kilobyte, Megabyte, Terabyte, Gigabyte
  2. Kilobyte, Megabyte, Gigabyte, Terabyte
  3. Terabyte, Gigabyte, Megabyte, Kilobyte
  4. Megabyte, Kilobyte, Terabyte, Gigabyte
8. Scenario-Based: Neha is setting up a home network and wants to connect multiple devices wirelessly. Which technology should she use?
  1. Ethernet
  2. Wi-Fi
  3. DSL
  4. Bluetooth
9. Assertion (A): HTML5 introduced new features such as and
Reason (R): HTML5 is the latest version of the Hypertext Markup Language used for creating web pages.
  1. Both A and R are true, and R is the correct explanation of A
  2. Both A and R are true, but R is not the correct explanation of A
  3. A is true, but R is false
  4. A is false, but R is true
10. Match the following computer components with their functions:
  1. CPU – Executes instructions and performs calculations
  2. RAM – Long-term storage of data and programs
  3. Hard Disk Drive – Temporarily stores frequently accessed data
  4. GPU – Manages input and output devices
11. Fill in the blank: ______ is a type of cyber attack where attackers attempt to deceive individuals into providing sensitive information such as passwords or credit card numbers.
  1. Malware
  2. Phishing
  3. DDoS
  4. Spoofing
12. Scenario-Based: A company wants to store and manage its customer data securely. Which database model should they use?
  1. Relational Database
  2. NoSQL Database
  3. Hierarchical Database
  4. Object-Oriented Database
13. Which of the following is NOT a characteristic of cloud computing?
  1. On-demand self-service
  2. Resource pooling
  3. Limited scalability
  4. Broad network access
14. Assertion (A): JavaScript is a server-side scripting language.
Reason (R): JavaScript is primarily used for adding interactivity to web pages.
  1. Both A and R are true, and R is the correct explanation of A
  2. Both A and R are true, but R is not the correct explanation of A
  3. A is true, but R is false
  4. A is false, but R is true
15. Which of the following is an example of an input device?
  1. Printer
  2. Keyboard
  3. Monitor
  4. Speaker
16. What is the purpose of a firewall in computer networking?
  1. To amplify network signals
  2. To monitor and control incoming and outgoing network traffic
  3. To provide physical connections between devices
  4. To store and retrieve data from the internet
17. Arrange the following programming languages in order of their level of abstraction, from lowest to highest:
  1. Python, Assembly, C, Java
  2. Assembly, C, Java, Python
  3. C, Assembly, Java, Python
  4. Java, Python, C, Assembly
18. Scenario-Based: An organization wants to ensure that only authorized users can access its network resources. Which security measure should they implement?
  1. Encryption
  2. Authentication
  3. Antivirus software
  4. Firewall
19. Assertion (A): HTML is a programming language used for creating and structuring web pages.
Reason (R): HTML stands for Hyper Text Markup Language and provides the structure of web pages.
  1. Both A and R are true, and R is the correct explanation of A
  2. Both A and R are true, but R is not the correct explanation of A
  3. A is true, but R is false
  4. A is false, but R is true
20. Match the following data storage devices with their storage capacity:
  1. DVD – 4.7 GB
  2. Blu-ray Disc – 700 MB
  3. USB Flash Drive – 25 GB
  4. CD – 50 GB

Discover more from TEST

Subscribe to get the latest posts sent to your email.

Copied!

Leave a Comment

Scroll to Top