Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Applied Business Tools and Technologies

The present overview of IT tools used in day to day use of computers and database operations. Designed to provide knowledge on various hardware and software.

number system

numeric complements

operating system

word processing

spreadsheet

excel

power point

data communication

computer network

internet

information technology

hospitality management

How can you display hidden text, such as tabs and paragraph marks?

  • Click the Show/Hide button in the Paragraph group of the Home tab on the Ribbon.
  • You can't display these characters: they are hidden for a reason.
  • Purchase Microsoft's secret hidden text decoder software.
  • Click the Hidden Text button in the Editing group of the Home tab on the Ribbon.

DOS command to make directory

  • DIR
  • CD
  • MD
  • RD

What year did the first Microsoft Word-based virus, spreads worldwide using macro commands.

  • 1997
  • 1994
  • 1995
  • 1996

The principle of ________________ specifies that only the sender and the intended recipient should be able to access the content of the message.

  • Availability
  • Confidentiality
  • Integrity
  • Authentication

To specify the size of the viewable area and allow users to reduce or enlarge the size of a document window, which command is used?

  • Zoom
  • Scale
  • Resize
  • Scope

What is a slide transition ?

  • special effect used to introduce a slide in a slide show
  • the way one slide looks
  • overheads
  • letters

The cell in the worksheet in which you can type data is called the __________.

  • Name Box
  • Formula Bar
  • Insertion Point
  • Active Cell

Add the following unsigned binary numbers: 0110 and 0101.

  • 01011
  • 01111
  • 01010
  • 11011

Underline, shadow, emboss, superscript, and subscript are all examples of text ____.

  • Colors
  • Styles
  • Fonts
  • Effects

A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

  • Tampering
  • Eavesdropping
  • Repudiation
  • Spoofing

Bulleted text can be converted to SmartArt easily

  • False
  • True

You can close a document which one of the following ways?

  • Press <Delete>.
  • Click the document’s Close button.
  • Click and drag the document window to the Recycle Bin
  • Press <Ctrl> + <C>.

Slide Themes that have design concepts, fonts, and color schemes.

  • Theme
  • Design
  • Layout
  • Blank

A fast way to add up this column of numbers is to click on the cell below the numbers and then:

  • Click Subtotals on the Data menu.
  • View the sum in the formula bar.
  • Type the formula in the formula bar
  • Click the AutoSum button on the Standard toolbar, then press ENTER.

Two or more users work with the computer at the same time

  • Multithreading
  • Multiuser
  • Multifunction
  • Multitasking

The core of the OS. Interacts with the BIOS (at one end), and the UI (at the other end).

  • Kernel
  • User Interface
  • File Management System
  • All of the choices

To select text means to ___________ a block of text.

  • emphasize
  • highlight
  • shade
  • color

Executes all arithmetic and logical operations. Arithmetic calculations like as addition, subtraction, multiplication and division.

  • Registers
  • Central Processing Unit
  • Control Unit
  • Arithmetic Logic Unit

Convert 110100101010 from binary to decimal.

  • 3020
  • 3100
  • 3610
  • 3370

The binary equivalent of the decimal number 10 is __________

  • 1010
  • 10
  • 0010
  • 010

The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s ___________.

  • World Wide Web
  • Browser
  • Home Page
  • Website

It is weakness which allows an attacker to reduce a system's information assurance.

  • Vulnerability
  • Backdoors
  • Virus
  • Denial-of-service attack

To sort data in Excel, go to the __________ ribbon.

  • View
  • Data
  • Home
  • Insert

Multiple pieces of data, sent simultaneously to increase the transmission rate

  • Bandwidth
  • Attenuation
  • Broadband
  • Data Communication

Convert 101101 from binary to decimal.

  • 61
  • 72
  • 45
  • 56

To save an existing document with a new file name or to save an existing document in a new location, which command is used?

  • Save As
  • Close
  • Exit
  • Save

Is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details.

  • Memory
  • System Software
  • Application Software
  • Program

It is the course of doing things in a sequence of steps.

  • Information
  • Data Processing
  • Data
  • Output

Specifies where data is lined up within the cell

  • Merge
  • Alignment
  • Indent
  • Orientation

File is (or is not) a candidate for backup.

  • System
  • Hidden
  • Archive
  • Read Only

This is activated by default. This allows you to scroll down both windows at the same time.

  • Side by Side
  • Switch Window
  • Reset Window Position
  • Synchronous Scrolling

Contains commands for working with the document, organized by tabs.

  • Status Bar
  • Ribbon
  • Quick Access Toolbar
  • Insertion Point

Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them

  • Integrity
  • Authentication
  • Availability
  • Reliability

_______ determines the best width for a column or the best height for a row.

  • Auto Fix
  • Auto Fit
  • Auto Align
  • Auto Size

Rules that govern data communication.

  • Narrowband
  • Protocols
  • Internet
  • Broadband

File will not be displayed in normal list of files.

  • Read Only
  • Hidden
  • System
  • Archive

_______ appear vertically and are identified by letters.

  • Cell
  • Column
  • Range
  • Row

_______________ are designated by dotted lines; they appear on a slide as guides, but they will not appear on the finished presentation.

  • Placeholders
  • Text area
  • Textbox
  • Typing Box

What key can you press to get help in Word 2013?

  • <Ctrl> + <H>
  • <Esc>
  • <F1>
  • <F11>

When creating a chart in Excel, what is the first thing you need to do?

  • Select the data to be graphed.
  • Double click the active cell
  • Select the Insert Tab
  • Choose a chart from the ribbon

The __________, or cell reference area, displays the cell reference of the active cell.

  • Insertion Point
  • Name Box
  • Active Cell
  • Formula Bar

Microsoft Excel is what kind of software?

  • Database Software
  • Presentation Software
  • Spreadsheet Software
  • Word Processing Software

RAM stands for?

  • Random Alternate Memory
  • Random Access Memory
  • Read Access Memory

You can change the format appearance of text and slides in the Slide View as well. Formatting can be applied to all slides at the same time as in the Master View or only on an individual slide.

  • Format placeholder
  • Format Text
  • All of the above
  • Format Slide

______________ is a software program produced by Microsoft that allows users to organize, format and calculate data with formulas using a spreadsheet system.

  • Microsoft Excel
  • Microsoft Access
  • Microsoft Word
  • Microsoft Powerpoint

A box with a dotted border text that resides in your layout to enter text

  • Placeholders
  • Placemakers
  • Dotted Box
  • Text Box

An electronic device, operating under the control of instructions stored in its own memory that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use

  • Input Device
  • Computer
  • Output Device
  • Hardware

An operator is a symbol that indicates the type of calculation to perform on the operands, such as a plus sign (+) for addition.

  • Style
  • Layout
  • Operator
  • Formula

Display a snapchat of each slide.

  • Thumbnail slide
  • Collapse
  • File Tab
  • Work Area

Someone who seeks and exploits weaknesses in a computer system or computer network, “a clever programmer“.

  • Senior Programmer
  • Virus
  • Hacker
  • Spoofer

Deletes the character to the left of the insertion point

  • Delete Key
  • Arrow key
  • Erase Key
  • Backspace key

Every worksheet is made up of thousands of rectangles, which are called _________.

  • Cells
  • Column
  • Spreadsheet
  • Row

Which key deletes text to the left of the insertion point?

  • <Backspace>
  • <Home>
  • <Insert>
  • <Delete>

To open a document, click the File tab and select ______

  • Find
  • Look in
  • Search
  • Open

What is the World Web usually called for short?

  • Browsing
  • Web
  • Internet
  • Surfing

Short cut key to highlight all elements in a document.

  • Ctrl + A
  • Shift + A
  • Shift + H
  • Ctrl + H

HTML stands for?

  • HyperTouch Markup Local
  • HyperTouch Makeup Local
  • Hypertext Markup Language
  • Hypertext Makeup Language

The _________ is a temporary storage place in the computer’s memory.

  • Hard Disk
  • Clipboard
  • RAM
  • Memory

It is a combination of a black hat and a white hat hacker.

  • Black hat hacker
  • Dark hat hacker
  • Black and White hat hacker
  • Gray hat hacker

On an Excel sheet, the active cell is indicated by ____.

  • A dotted border
  • None of the above
  • A blinking border
  • A dark wide border

A number of letter that appears little above the normal text is called :

  • Supertext
  • D
  • Superscript
  • Subscript
  • Toptext

On the View Ribbon, which command allows the document to be viewed as it would appear in a multilevel outline?

  • Outline
  • Print Layout
  • Draft
  • Web Layout

A Theme gives your slides a consistent appearance throughout your presentation.

  • Design Theme
  • Template
  • Slide
  • Presentation

It is the processed and organized data presented in a meaningful form

  • Data
  • Data Gathering
  • Output
  • Information

Electronic messages sent over the Internet can be easily snooped and tracked, revealing who is talking to whom and what they are talking about.

  • Theft of Personal information
  • Internet Addiction
  • Spamming
  • Virus threat

The ________________ lets you access common commands no matter which tab is selected.

  • Toolbar
  • Ribbon
  • Quick Access Toolbar
  • Menu Bar

What are movements from one slide to another during a presentation called?

  • Simulations
  • Transition
  • Animation
  • Emphasis

Areas of the Ribbon that arrange commands based on their functions

  • Groups
  • Ribbon
  • Command Tab

The intersection of a row and column.

  • row
  • active cell
  • column
  • cell

Which of the following is worksheet view of Microsoft Excel 2013?

  • Page Break view
  • Page layout view
  • All of the above
  • Normal View

In an _________ range, all cells touch each other and form a rectangle.

  • Parallel
  • Equal
  • Adjacent
  • Straight

To apply center alignment to a paragraph we can press

  • Ctrl + C
  • Ctrl + S
  • Ctrl + E
  • Ctrl + A

Which of the following actions or commands cannot be undone in Microsoft Word?

  • Borders and shading
  • Font color change and font size change
  • Saving a document
  • Paragraph alignment and page orientations

Allows data and programs to be sent to the CPU.

  • System Software
  • Output Device
  • Input Device
  • Application Software

Information is probably the biggest advantage internet is offering.

  • True
  • False

Add the following unsigned binary numbers: 101010 and 001111.

  • 111000
  • 100001
  • 111001
  • 110001

Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred.

  • Protocols
  • Broadband
  • Internet
  • Narrowband

A commercial organization with permanent connection to the Internet that sells temporary connections to subscribers.

  • Internet Service Provider (ISP)
  • Internet Connection
  • Browser
  • Internet Protocol

How do you switch between multiple document windows?

  • You can only open one document at a time in Microsoft Word.
  • Right-click the Windows taskbar and select Arrange All.
  • Click the document’s button on the Windows taskbar.
  • Buy another monitor for your computer.

The input hexadecimal representation of 1110 is _______________

  • 14
  • 0111
  • E
  • 15

Convert 01000010 from binary to decimal.

  • 64
  • 62
  • 60
  • 66

_____ appear horizontally and are identified by numbers.

  • Cell
  • Range
  • Column
  • Row

A collection of linked Web pages that has a common theme or focus is called a Web site.

  • Browser
  • World Wide Web
  • Home Page
  • Website

It directs and controls the entire computer system and performs all arithmetic and logical operations.

  • Random Access Memory
  • Hard Disk
  • Memory Card
  • Central Processing Unit

They are known as crackers or dark-side hackers. Someone violating computer or Internet security maliciously or for illegal personal gain.

  • Dark hat hacker
  • White hat hacker
  • Black hat hacker
  • Gray hat hacker

Designed to handle data communication for multiple organizations in a city and nearby cities as well.

  • Local area (LAN)
  • All of the Choices
  • Wide area (WAN)
  • Metropolitan area (MAN)

A section of the ribbon in Office programs that identifies groups of commands based on their groups

  • Tab Group
  • Ribbon Group
  • Ribbon
  • Tab

It is often viewed as the act of sending unsolicited email. This multiple or vast emailing is often compared to mass junk mailings.

  • Virus threat
  • Internet addiction
  • Negative effects on family communication
  • Spamming

This view displays your document as it will appear when printed and is best for working in documents with images.

  • Read Mode
  • Web Layout view
  • Outline view
  • Print Layout view

Display headings and text in outline form so you can see the structure of your document and reorganize easily.

  • Print Layout
  • Draft
  • Outline
  • Print

Amount of data that can be transferred from one point to another in a certain time period

  • Attenuation
  • Data Communication
  • Broadband
  • Bandwidth

What tab allows us to insert pictures?

  • insert
  • animation
  • home
  • design

Which of the following is not a binary number?

  • 1111
  • 000
  • 11E
  • 101

From an administrator’s point of view, a network can be private network which belong to a single autonomous system and cannot be accessed outside its physical or logical domain.

  • Geographical Span
  • Network Architecture
  • Network Applications
  • Administration

It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of your hand or in your pocket.

  • Tablet computer
  • Netbook
  • Mobile Device
  • Laptop

Connects workstations and peripheral devices that are in close proximity.

  • Wide area (WAN)
  • Local area (LAN)
  • All of the choices
  • Metropolitan area (MAN)

It is the tangible part of a computer system.

  • Input Devices
  • Hardware
  • Output Devices
  • Software

_____________ adjusts the size of the windows so that they share the screen equally.

  • Side by Side
  • Reset Window Position
  • Synchronous Scrolling
  • Switch Window

To save a new file or an existing file in its same storage location, which commonly used shortcut key or keyboard key combination is used?

  • CTRL+S
  • CTRL+V
  • ALT+S
  • Shift + S

This view is optimized for reading on a portable device, such as a tablet or smart phone.

  • Outline view
  • Web Layout view
  • Read Mode
  • Print Layout view

Being responsible online includes: A) Keeping passwords a secret & being nice B) Telling an adult when I fell unsafe C) None of the above D) All of the above

  • A
  • D
  • B
  • C

It is the largest network in existence on this planet.

  • Internet
  • Wide Area Network
  • Connection
  • Wi-Fi

___________ is a permanent form of storage

  • RAM
  • ROM
  • Optical Disk
  • Hard Disk

Work in ___________ when you need to organize and develop the content of your document.

  • Outline view
  • Print Layout view
  • Read Mode
  • Web Layout view

___________, a University of Southern California doctoral student, comes up with term “computer virus.”

  • Robert Morris
  • Grace Murray
  • Fred Cohen
  • Ralph Smith

What is the Quick Access Toolbar?

  • An extension of the Windows taskbar.
  • There are no toolbars in Word 2013.
  • What appears when you select text.
  • A customizable toolbar of common commands that appears above or below the Ribbon.

Deletes the character to the right of the insertion point.

  • Erase key
  • Backspace key
  • Delete Key
  • Arrow key

Special effects used to introduce slides in a presentation are called

  • custom animations
  • transitions
  • present animations

The primary view that you use to write, edit, and design your presentation and is divided into three areas: Slides and notes pane

  • Slide View
  • Primary View
  • Home View
  • Normal View

The Slide Master View is located on the __________ ribbon.

  • File
  • View
  • Design
  • Insert

This command allows you to see these hidden formatting marks.

  • Replace
  • Seek
  • Find
  • Show/Hide

___________________ is a presentation application that enables an individual from any technical level to create a dynamic and professional-looking presentation

  • Microsoft PowerPoint
  • Microsoft Excel
  • Microsoft Access
  • Microsoft Word

An unauthorized user gaining physical access to a computer (or part thereof) can perform many functions, install different types of devices to compromise security, including operating system modifications, software worms, key loggers, and covert listening devices.

  • Direct-access attacks
  • Denial-of-service attack
  • Spoofing
  • Eavesdropping

A customization toolbar on the left side of a Microsoft application program window's title bar, containing icons that you click to quickly perform common actions, such as saving a file and undo

  • Regular Tab
  • Quick Access Toolbar
  • Tab
  • Ribbon

It consists of information organized into Web pages containing text and graphic images.

  • Browser
  • World Wide Web
  • Internet
  • Search Engine

The button that provides a shortcut to typing formulas.

  • Sum function
  • Equal sign
  • AutoSum
  • Function

Show how a document will look when it is printed.

  • Outline
  • Draft
  • Print Layout
  • Print

This view is good for most simple word-processing tasks, such as typing, editing, and formatting.

  • Outline View
  • Print Layout view
  • Read Mode
  • Draft view

The act of surreptitiously listening to a private conversation, typically between hosts on a network.

  • Tampering
  • Exploits
  • Eavesdropping
  • Denial-of-service attack

Each cell is identified by a unique __________.

  • Cell Reference
  • Row
  • Column
  • Cell

A symbol such as a heavy dot or other character that precedes text in a presentation is called aNo ____.

  • Asterisk
  • Bullet
  • List
  • Text slide

How can you stop a slide show ?

  • press delete
  • press the right arrow
  • press escape
  • press the left arrow

To move a text placeholder, you:

  • Click and drag on a handle on the placeholder
  • Click and drag on the placeholder's hashed border
  • Double click on the center and then drag
  • Click and drag on the center of the placeholder

The confidential information sent by A to B which is accessed by C without the permission or knowledge of A and B.

  • Access control
  • Integrity
  • Authentication
  • Availability

The numbers in Excel represent the...

  • Row
  • Data
  • Cell
  • Rows

Slides that are unformatted and have no color scheme.

  • Layout
  • Design
  • Blank
  • Theme

It is a collection of independent and unorganized facts.

  • Output
  • Data
  • Data Gathering
  • Information

Which command is used to insert a sound clip into a slide?

  • Audio
  • Sound
  • Play
  • Music

What does the mouse pointer look like in a spreadsheet?

  • Two headed arrow
  • Selection cross
  • Arrow
  • Hand

A program that spreads copies of itself through a network.

  • Logic bomb
  • Trojan Horse
  • Worm
  • Trapdoor

It refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched

  • Output Device
  • Hardware
  • Input Device
  • Software

A mechanism helps in establishing proof of identification.

  • Authentication
  • Availability
  • Confidentiality
  • Integrity

_______________ mechanism helps in establishing proof of identification.

  • Availability
  • Authentication
  • Access Control
  • Integrity

It is a unit of information equivalent to the result of a choice between only 2 possible alternatives in the binary number system.

  • Binary
  • Code
  • Bit
  • Byte

This determines how all the elements on a slide are arranged, including text and content placeholders

  • Slide Layout
  • Preview
  • Content Placeholder
  • Theme

Shows where text will appear when you begin typing.

  • Quick Access Toolbar
  • Ribbon
  • Insertion Point
  • Status Bar

Contains buttons (icons) for common commands.

  • Insertion Point
  • Ribbon
  • Quick Access Toolbar
  • Status Bar

Device that connects a user to the Internet.

  • LAN Cable
  • PC
  • Modem
  • Smart Phone

Which of the following is NOT a new feature in Word 2013?

  • The Ribbon
  • Paste with Live Preview
  • Improved picture editing
  • Backstage view

What is the cell in the worksheet in which you can type data?

  • Open cell
  • Main cell
  • Active cell
  • Absolute cell

It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/ IP) to serve billions of users worldwide.

  • Internet
  • WAN
  • Bluetooth
  • LAN

The hexadecimal representation of 14 is _______________

  • E
  • F
  • D
  • A

It means that assets are accessible to authorized parties at appropriate times.

  • All of the above
  • Availability
  • Access Control
  • Accessibility

A ______ is a preset collection of design elements, including fonts, colors, and effects.

  • Theme
  • Layout
  • Style
  • Design

The 2’s complement of 15 is ____________

  • 0100
  • 0000
  • 0010
  • 0001

To alert Excel that you are entering a formula and not text, type aNo ____________ preceding the formula.

  • &
  • =
  • *
  • #

The _______________ provides the space for your worksheets and workbook elements such as charts.

  • Application Window
  • Quick Access Toolbar
  • Interface
  • Toolbar

Displays your workbook in full-screen mode and completely hides the Ribbon.

  • Commands
  • Tab
  • Auto-hide Ribbon
  • Ribbon display option

###### means in a Cell:

  • Wrong formula
  • You've misspelled something.
  • You've entered a number wrong.
  • The cell is not wide enough.

Components of a network can be connected to each other differently in some fashion.

  • Network Architecture
  • Administration
  • Inter-Connectivity
  • Network Applications

Daniel wants each slide to appear with a checkerboard effect. Which of the following would you apply to cause this effect?

  • Object
  • Animation
  • Transition
  • Trigger

_______________ is an Internet utility software used to uploaded and download files.

  • All of the above
  • E-Mail
  • File Transfer Protocol
  • Telnet

In Excel, the name of the bar where information appears as you input data is called?

  • File Bar
  • Formula Bar
  • Help Bar
  • Window Bar

Effects applied to placeholders or other content to move the content in unique ways on the slide is which of the following?

  • Format
  • Animation
  • Layouts
  • Transitions

It is now an essential communication tools in business.

  • Information
  • Services
  • Online Chat
  • Email

The following are Master Slide of Microsoft PowerPoint except

  • Presentation Master
  • Notes Master
  • Slide Master
  • Handout Master

A ___________ in a computer system, is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected.

  • Spoofing
  • Backdoors
  • Denial-of-service attack
  • Eavesdropping

A ________ is a grid of rows and columns in which you enter text, numbers, and the results of calculations.

  • Document
  • Table
  • Workbook
  • Spreadsheet

To print a presentation using shortcut keys, press ____.

  • ALT+P
  • CTRL+P
  • TAB+P
  • ALT+TAB

These are effects that are in place when you switch from one slide to the next.

  • Animations
  • Effects
  • Designs
  • Transitions

Press ______ to move the insertion point to the beginning of the document.

  • <Ctrl> + <End>
  • <Ctrl> + <Home>
  • <Ctrl>+ <up arrow> key
  • <Ctrl> + <G>

The octal equivalent of 1100101.001010 is ______

  • 145.21
  • 154.12
  • 145.12
  • 624.12

You can access many ‘chat rooms’ on the web that can be used to meet new people, make new friends, as well as to stay in touch with old friends.

  • Social Media
  • Mobile Device
  • Online Chat
  • Services

It is a generic term for organized collections of computer data and instructions

  • Input Device
  • Software
  • Hardware
  • Output Device

It is the largest network in the world that connects hundreds of thousands of individual networks all over the world.

  • Browser
  • Signal
  • Internet
  • World Wide Web

What is the default file extension for a document created in Word?

  • .dot
  • .dok
  • .docx
  • .dox

What function adds all of the numbers in a range of cells?

  • Max
  • Sum
  • Compute
  • Calculate

Where can you find basic file management commands and program options?

  • Status bar
  • Title bar
  • Close Button
  • File tab

A computer network spanned inside a building and operated under single administrative system is generally termed as __________________.

  • Local Area Network
  • Wide Area Network
  • Personal Area Network
  • Metropolitan Area Network

It is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to data.

  • Network Security
  • Physical Security
  • System Security
  • Software Security

It is a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single unit for information.

  • Binary
  • Code
  • Bit
  • Byte

The value of base in a decimal number system is ____________

  • 10
  • 15
  • 8
  • 2

It is the software that you run on your computer to make it work as a web client.

  • Web Client
  • HTML
  • Web Server
  • Web Browser

Convert 10100011 from binary to decimal.

  • 121
  • 212
  • 163
  • 199

If I want to find an average of cells A1 through A25, which formula would I use?

  • =avg(A1:A25)
  • =avg(A1-A25)
  • =average(A1-A25)
  • =average(A1:A25)

The letters in Excel represent the...

  • Rows
  • Cells
  • Data
  • Columns

It is the intersection of a row and a column

  • Cell Reference
  • Row
  • Column
  • Cell

Text-styling feature of MS word is

  • WordDesign
  • WordStyle
  • WordArt
  • WordFont

An Excel file format extension is

  • ppt
  • xls
  • doc
  • txt

___________ is a weakness which allows an attacker to reduce a system's information assurance.

  • Backdoors
  • Direct-access attacks
  • Vulnerability
  • Denial-of-service attack

_______________ refers to an Internet connection that is established using a modem.

  • Dial-up connection
  • Leased Connection
  • DSL connection
  • Wi-Fi

Which key do you press to go into Slide Show view and always start on the first slide?

  • F7
  • F5
  • F9
  • ESC

Which of the following should you use if you want all the slide in the presentation to have the same “look”?

  • add a slide option
  • the slide layout option
  • outline view
  • a presentation design template

It display the name of the open file.

  • Ribbon
  • Quick Access Toolbar
  • File Tab
  • Title bar

When you reach the right margin, the text continues on the next line. This feature is called _______.

  • Word Padding
  • Word Wrap
  • Word Adjust
  • Word Margin

Attack launched by a third-party computer by using someone else's computer to launch an attack, it becomes far more difficult to track down the actual attacker.

  • Information disclosure
  • Exploits
  • Indirect attacks
  • Hacking

During a slide show, pressing the Esc key:

  • Displays the previous slide
  • Ends the slide show
  • Displays the last slide
  • Displays slide 1

An _________ is a constant (text or number) or cell reference used in a formula.

  • Operator
  • Operand
  • Formats
  • Formula

It is used to accomplish specific tasks other than just running the computer system.

  • Operating System
  • Application Software
  • Computer System
  • System Software

Internet provides facility to access wide range of Audio/Video songs, plays films.

  • E-commerce
  • Online chat
  • Information
  • Entertainment

DOS command to remove a directory or an entire directory tree.

  • RD
  • MD
  • CD
  • DIR

This is any peripheral (piece of computer hardware equipment to provide data and control signals to an information processing system such as a computer or other information appliance.

  • Output Devices
  • Program
  • CPU
  • Input Devices

In order to save an existing document with a different name you need to:

  • Retype the document and give it a different name.
  • Copy and paste the original document to a new document and then save.
  • Use Windows Explorer to copy the document to a different location and then rename it.
  • Use the Save as... command.

A storage module made of flash memory chips.

  • ROM
  • Flash Disk
  • Optical Disk
  • Hard Drive

It primarily provides services for running applications on a computer system.

  • Application System
  • None of the above
  • Computer System
  • Operating System

Changes the space between the cell border and its content

  • Merge
  • Orientation
  • Alignment
  • Indent

Web is a collection of files that reside on computers, called _____________, that are located all over the world and are connected to each other through the Internet.

  • Web Client
  • Web Browser
  • HTML
  • Web Server

It is a piece of software, a chunk of data, or sequence of commands that takes advantage of a software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerized).

  • Spoofing
  • Repudiation
  • Exploits
  • Indirect attacks

It is a battery or AC-powered personal computer that can be easily carried and used in a variety of locations.

  • Laptop
  • Netbook
  • Mobile Device
  • Tablet Computer

____________ are visual special effects that you see when you move from one slide to the next.

  • Transitions
  • Animation
  • View
  • Slideshow

Each slide has an area where text and graphics are entered for a presentation.

  • Slide
  • Blank page
  • Page
  • Work Area

A class of malicious code that "detonates" or goes off when a specified condition occurs.

  • Trapdoor
  • Logic bomb
  • Trojan Horse
  • Worm

Convert : (110)2 = ( __ )10.

  • 4
  • 9
  • 6
  • 5

The file used to store worksheets is called a ________.

  • Spreadsheet
  • Work cell
  • Workbook
  • Cell

It is an electronic machine that follows a set of instructions in order that it may be able to accept and gather data and transform these into information.

  • Computer
  • Hardware
  • Machine
  • Input and Output Devices

When you use your Internet connection to become part of the Web, your computer becomes a __________ in a worldwide client/server network.

  • Web Client
  • Web Server
  • Web Browser
  • HTML

A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.

  • Mainframe
  • Minicomputer
  • Supercomputer
  • Personal Computer

A group of selected cells is called a _____.

  • Area
  • Active cell
  • Formula
  • Range

It is smallest network which is very personal to a user.

  • Wide Area Network
  • Metropolitan Area Network
  • Personal Area Network
  • Local Area Network

What is the name assigned to a file when it is saved?

  • Document title
  • File title
  • File name
  • Document name

What is the control center located below the title bar at the top of the Microsoft Word window called?

  • Tab
  • Ribbon
  • Group
  • Task Pane

A box on a slide reserved for the title of a presentation or slide

  • Content Placeholder
  • Subtitle Placeholder
  • Text Placeholder
  • Title Placeholder

A multi-user computer capable of supporting from 10 to hundreds of users simultaneously.

  • Workstation
  • Minicomputer
  • Mainframe
  • Personal Computer

The program is meant to make computers more efficient, but later hackers modify it into computer viruses that destroy or alter data.

  • Worm
  • Virus
  • Error
  • Bug

This is the brain of the computer.

  • CPU
  • Memory Card
  • RAM
  • Hard Disk

Type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure

  • Cable Modem Connection
  • Leased Connection
  • VSAT
  • DSL connection

This describes a situation where information, thought as secure, is released in an untrusted environment.

  • Eavesdropping
  • Tampering
  • Information disclosure
  • Repudiation

Text in Excel is automatically aligned _____________.

  • Justify
  • Center
  • Left
  • Right

The only language which the computer understands is ______________

  • BASIC
  • Assembly Language
  • Binary Language
  • C language

It contains multiple tabs, each with several groups of commands. You will use these tabs to perform the most common tasks in Excel.

  • Collapse Button
  • Group bar
  • Ribbon
  • Formula Bar

What year did admiral Grace Murray Hopper finds a moth among the relays of a Navy computer and calls it a “bug.”

  • 1947
  • 1946
  • 1948
  • 1945

Add the following unsigned binary numbers: 10110110 and 01100010.

  • 00011000
  • 11011000
  • 10011000
  • 00011001

Display information about the current document and process.

  • Status Bar
  • Quick Access Toolbar
  • Ribbon
  • Insertion Point

A ___________ is a unique name associated with a specific IP address by a program that runs on an Internet host computer.

  • Domain Server
  • Domain Name
  • DNS
  • Address

To delete the slide currently displayed in the Slide Pane:

  • Select the Exit command
  • Select the Delete Slide command
  • Select the Removal command
  • Press the Backspace key

Why the document you created at home displays with a different font at school?

  • Because you have a different monitor at school than at home.
  • Because the version of Windows is different.
  • Because you have a different printer at school than at home.
  • Because the font you used at home is not installed on your school computer.

These are designated by dotted lines; they appear on a slide as guides, but they will not appear on the finished presentation.

  • Textbox
  • Input Text
  • Placeholder
  • Text Holder

_________ of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

  • Tampering
  • Spoofing
  • Elevation of privilege
  • Exploits

Convert the binary equivalent 10101 to its decimal equivalent.

  • 12
  • 31
  • 21
  • 22

Which keyboard shortcut bolds selected text?

  • Ctrl+B
  • Alt+B
  • File/Format/Bold
  • None of the above.

Rotates cell contents to a angle or vertically

  • Indent
  • Orientation
  • Alignment
  • Merge

1 TB is compose of?

  • 1000 gigabytes
  • 1000 megabytes
  • 1024 megabytes
  • 1024 gigabytes

This is a closed source commercial presentation program developed by Microsoft.

  • Excel
  • Access
  • PowerPoint
  • Word

Which commonly used animation effect makes text on a slide appear in the presentation?

  • Motion
  • Emphasis
  • Exit
  • Entrance

Add the following unsigned binary numbers: 0011 and 1101.

  • 1100
  • 1000
  • 0000
  • 0001

Excel refers to files as.

  • Presentations
  • Documents
  • Workbooks
  • Databases

A horizontal strip near the top of the window that contains tabs of grouped command buttons that you click to interact with the app

  • Tab
  • Ribbon Group
  • Tab Group
  • Ribbon

PowerPoint has a set of Master Slides available for every Design Theme. The three Masters include a Slide Master, Handout Master, and ______.

  • Layout Master
  • Presentation Master
  • Notes Master
  • Design Master

Two or more parts of the same process running at the same time.

  • Multiuser
  • Multifunction
  • Multithreading
  • Multitasking

To store a new or existing file with the same name, which button is used?

  • Save As
  • Save
  • Exit
  • Close

Combines multiple cells into one cell.

  • Indent
  • Orientation
  • Merge
  • Alignment

File may be viewed, copied, executed (if appropriate), but not changed. It can be deleted.

  • Read Only
  • Hidden
  • Archive
  • System

In which view Headers and Footers are visible

  • Print Layout View
  • Normal View
  • Draft View
  • Page Layout View

A slider on the status bar that is dragged to enlarge or decrease the display size of the document in the document window

  • Slider Zoom
  • Sizing Handles
  • Zoom Plus/Minus
  • Zoom Slider

Computers should work without having unexpected problems

  • Authentication
  • Reliability
  • Availability
  • Integrity

The _____ begins with an equal sign (=).

  • Number Format
  • Style
  • Layout
  • Formula

The address of a World Wide Web page

  • textbox
  • netiquette
  • phishing
  • url

Add the following unsigned binary numbers: 1111 and 0011.

  • 0110
  • 0011
  • 1010
  • 0010

Which of the following is the correct representation of a binary number?

  • 1110
  • (110)2
  • (124)2
  • (000)2

It displays the location, or "name" of a selected cell.

  • Name box
  • Cell box
  • Address box
  • Formula bar

In the __________________, you can enter or edit data, a formula, or a function that will appear in a specific cell.

  • Cell
  • Formula bar
  • Rows
  • Toolbar

Moves data to a new line when the cell is not wide enough to display all the contents

  • Alignment
  • Orientation
  • Wrap Text
  • Merge

It is the general name for unanticipated or undesired effects in programs or program parts, caused by an agent intent on damage.

  • Trojan Horse
  • Logic bomb
  • Malicious code
  • Trap door

Convert 11101111 from binary to decimal.

  • 239
  • 229
  • 217
  • 231

Which action would Drake take to insert the contents from the Office Clipboard into a document?

  • Merge Formatting
  • Paste
  • Keep Source Formatting
  • Keep Text Only

Electronic transfer of data from one location to another.

  • Data Communication
  • Bandwidth
  • Broadband
  • Attenuation

PowerPoint is best described as:

  • Desktop publishing software
  • Database software
  • Presentation software
  • Drawing Software

The direction of a rectangular page for viewing and printing is called

  • Preview
  • Orientation
  • Print Layout
  • Direction

Spans several cities, states, or countries, and is owned by different parties.

  • Local area (LAN)
  • Wide area (WAN)
  • All of the Choices
  • Metropolitan area (MAN)

The ROM stands for?

  • Random Over Memory
  • Random Only Memory
  • Read Over Memory
  • Read Only Memory

A bit in a computer terminology means either 0 or 1.

  • True
  • False
Comments
Buy Me Coffee

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Driver Device

Computer System

Information Systems Operations and Maintenance

Computer Fundamentals

Bookkeeper and Clerk

Fundamentals of Database System

Database Management System

Object Oriented Programming Laboratory

Mobile Programming

Network Security

Mobile Application Design and Development 2

Mobile Application Design and Development

Management Information Systems

Managing Information and Technology

Mail and Web Services

Living in the Information Technology Era

Information Technology Capstone Project

Information Technology Practicum

Intro to Hardware Description Language

Introduction to Multimedia

Introduction to Information Systems

Introduction to Human Computer

Introduction to Computing

Internet Marketing and Entrepreneurship

Internet Technology in Real Estate

Integrative Programming and Technology 2

Information Assurance and Security 2

Information Security and Management

Information Assurance and Security 3

Fundamentals of Investigation and Intelligence

Digital Imaging

Data Structures and Algorithms

Data Communications and Networking 2

Data Communications and Networking

Cyber Security: Theories and Practice

Chemistry for Engineers

Auditing and Assurance Concepts and Applications

Animation Project

3D Game Art Development

Load Testing

Software Engineering

System Administration and Maintenance

Integrative Programming and Technology

Data Communications and Networking 4

Current Trends and Issues

Linux Administration

Computer Programming

Systems Integration and Architecture

Application Lifecycle Management

Data Communications and Networking 3

Information Assurance and Security

Principles of Operating System and its Application

Production Operations Management with Total Quality Management

Philippine Tourism Geography and Culture

Operation Management

Operations Auditing

Operations Management in the Tourism and Hospitality Industry

Multi Cultural Diversity in Workplace for the Tour

Micro Perspective of Tourism and Hospitality

Legal Aspects in Tourism and Hospitality

Macro Perspective of Tourism and Hospitality

Kitchen Essentials and Basic Food Preparation

International Issues for Human Resources Management

Human Resource Management

Entrepreneurship in Tourism and Hospitality

Compensation Administration

Introduction to Transport Services

Catering Management

Bread and Pastry


Show All Subject
Affiliate Links

Shopee Cashback Voucher

Temu $0 Shipping Fee

Amazon 75% Off Discounts