We have listed here some multiple choice questions with answer on Computer Fundamental concept, Which has asked by multiple companies like Genpact, Syntel, Ericsson, Zensar, Virtusa etc.

You can prepare your job written and interview by using these sets of question fro here.

1. Wi-Fi stands for?
a) Wireless fidelity
b) Wireless Flexibility
c) Wide Fidelity
d) WAN Flexibility

Answer: a

2. Several instructions execution simultaneously in?
a) processing
b) parallel processing
c) serial processing
d) multitasking

Answer: b

3. The technology that has the ability to interact with the world.
a) AI
b) ML
c) IOT
d) IT

Answer: a

4. A particular system that contains intelligent agents.
a) AI systems
b) Agency
c) Autonomous systems
d) Company

Answer: b

5. A type of non-monotonic reasoning.
a) Ordinary
b) Special
c) Duplicate
d) Default

Answer: d

6. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT

Answer: c

7. The process of verifying the identity of a user.
a) Authentication
b) Identification
c) Validation
d) Verification

Answer: a

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control

Answer: d

9. The process of transforming plain text to unreadable text.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding

Answer: b

10. WTLS stands for?
a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer

Answer: a

11. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller

Answer: b

12. A small program that changes the way a computer operates.
a) Worm
b) Trojan
c) Bomb
d) Virus

Answer: d

13. A cipher in which the order is not preserved.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Public key based

Answer: b

14. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification

Answer: a

15. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing

Answer: d

16. An attack in which the user receives unwanted amount of e-mails.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm

Answer: c

17. These ciphers replace a character or characters with a different character or characters, based on some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based

Answer: d

18. In public key cryptography, a key that decrypts the message.
a) public key
b) unique key
c) private key
d) security key

Answer: c

19. Triple-DES has ______ keys.
a) 1
b) 2
c) 5
d) 4

Answer: b

20. Wearable computing device in the form of computerized eyeglasses.
a) HMD
b) Helmets
c) Smart Glasses
d) VR Glasses

Answer: c

21. A technique that enables light field which is generally the product of a light source scattered off objects.
a) AES
b) Holography
c) Cryptography
d) Gyrography

Answer: b

22. A model that is the demo implementation of the system.
a) waterfall
b) prototype
c) incremental
d) agile

Answer: b

23. ___________ is a step in which design is translated into machine-readable form.
a) Design
b) Conversion
c) Debugging
d) Coding

Answer: d

24. What do you call a technical person who is capable of understanding the basic requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder

Answer: b

25. An individual who plans and directs the work.
a) Stakeholder
b) Project manager
c) Team leader
d) Programmer

Answer: b