Explore topic-wise MCQs in Computer Fundamentals.

This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.

1.

A program that copies itself.

A. Worm
B. Virus
C. Trojan
D. Bomb
Answer» B. Virus
2.

An attack in which the site is not capable of answering valid request.

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» C. E-mail bombing
3.

Attack in which a user creates a packet that appears to be something else.

A. Smurfing
B. Trojan
C. E-mail bombing
D. Spoofing
Answer» E.
4.

A technique in which a program attacks a network by exploiting IP broadcast addressing operations.

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» B. Denial of service
5.

These ciphers replace a character or characters with a different character or characters, based on some key.

A. Polyalphabetic substitution based
B. Transposition-based
C. Substitution based
D. Mono alphabetic substitution based
Answer» E.
6.

Triple-DES has ______ keys.

A. 1
B. 2
C. 5
D. 4
Answer» C. 5
7.

An attack in which the user receives unwanted amount of e-mails.

A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Answer» D. Ping storm
8.

An algorithm in encryption is called _____________

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» D. Module
9.

A small program that changes the way a computer operates.

A. Worm
B. Trojan
C. Bomb
D. Virus
Answer» E.
10.

The information that gets transformed in encryption is ____________

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» B. Parallel text
11.

Security features that control that can access resources in the OS.

A. Authentication
B. Identification
C. Validation
D. Access control
Answer» E.
12.

A ________ is tested to ensure that information properly flows into and out of the system.

A. module interface
B. local data structure
C. boundary conditions
D. paths
Answer» B. local data structure
13.

A testing strategy that tests the application in the context of an entire system.

A. System
B. Validation
C. Unit
D. Gray box
Answer» B. Validation
14.

A planned program if work that requires a definitive amount of time, effort and planning to complete.

A. Problem
B. Project
C. Process
D. Program
Answer» C. Process
15.

An individual who plans and directs the work.

A. Stakeholder
B. Project manager
C. Team leader
D. Programmer
Answer» C. Team leader
16.

A _______ can be recorded using a normal light source.

A. Holograph
B. Photography
C. Holography
D. Photograph
Answer» E.
17.

Methodology in which project management processes were step-by step.

A. Incremental
B. Waterfall
C. Spiral
D. Prototyping
Answer» C. Spiral
18.

An electronic document that establishes your credentials when you are performing transactions.

A. Digital code
B. OTP
C. E-mail
D. Digital certificate
Answer» E.
19.

AR is interactive in real-time.

A. True
B. False
Answer» B. False
20.

SLAM stands for?

A. Simultaneous localization and mapping
B. System localization and mapping
C. Simultaneous localization and maintenance
D. System localization and maintenance
Answer» B. System localization and mapping
21.

A ______________________ is a display device, worn on head as a part of helmet that has a small display optic.

A. HD
B. MD
C. HMD
D. ARD
Answer» D. ARD
22.

Technologies that completely involve a user inside a synthetic environment.

A. AR
B. VR
C. AI
D. ML
Answer» C. AI
23.

A technique that enables light field which is generally the product of a light source scattered off objects.

A. AES
B. Holography
C. Cryptography
D. Gyrography
Answer» C. Cryptography
24.

Technologies that allow the user to see the real world, with virtual objects composited in the real world.

A. AR
B. VR
C. AI
D. SR
Answer» B. VR
25.

Wearable computing device in the form of computerized eyeglasses.

A. HMD
B. Helmets
C. Smart Glasses
D. VR Glasses
Answer» D. VR Glasses
26.

A field of technology that deals with a combination of real world and the data generated from computer.

A. ML
B. AI
C. AR
D. IoT
Answer» D. IoT
27.

Encryption standard that is selected by the US government to replace DES.

A. AES
B. BES
C. CES
D. DES
Answer» B. BES
28.

A programming technique in which the focus is on doing things.

A. object oriented
B. procedural
C. logical
D. structural
Answer» C. logical
29.

A basic unit of object-oriented programming.

A. module
B. block
C. object
D. token
Answer» D. token
30.

A procedural programming follows ___________ approach.

A. top-down
B. bottom-up
C. left-right
D. right-left
Answer» B. bottom-up