Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

1- Any kind of computers consists of

a) Hardware and software


b) Hardware and applications.
c) Software and applications.
d) Hardware, software and applications.
2- Computer __________ is the collection of physical elements that constitutes a computer
system.
a) Hardware.
b) Applications.
c) Software.
3- The monitor, mouse, keyboard, computer data storage, hard drive disk (HDD) are
Computer_______.
a) Hardware.
b) Applications.
c) Software.

4- _______Translate data from form that humans understand to one that the computer can work
with.
a) Input device.
b) Output device.
c) Software.
5- A_______ is brain of a computer.
a) Input device.
b) Output device.
c) Central Processing Unit (CPU).
6- The CPU is comprised of three main parts:.
a) Input device, ALU and CU.
b) Output device, CU, and Primary Memory.
c) Registers, ALU, and CU.
7- _________is controls and co-ordinates computer components.
a) ALU.
b) CU.
c) Primary Memory.
8- _________is Executes all arithmetic and logical operations.
a) ALU.
b) CU.
c) Primary Memory.
9- _________ stores the data that is to be executed next.
a) ALU.
b) CU.
c) Registers.
10- _________ read the code for the next instruction to be executed.
a) ALU.
b) CU.
c) Registers.
11- _________ Increment the program counter so it points to the next instruction.
a) ALU.
b) CU.
c) Registers.
12- _________ Read whatever data the instruction requires from cells in memory..
a) ALU.
b) CU.
c) Registers.
13- _________ Provide the necessary data to an ALU or register.
a) ALU.
b) CU.
c) Registers.
14- _________ If the instruction requires an ALU or specialized hardware to complete, instruct the hardware to
perform the requested operation.
a) ALU.
b) CU.
c) Registers.
15- RAM is a_______.
a) ALU.
b) CU.
c) Registers.
d) Primary Memory.
16- ______________it can be promptly accessed by the processor as and when needed..
a) ALU.
b) CU.
c) RAM.
d) ROM.
17- RAM is a_______.
a) Random Access Memory.
b) Arithmetic Logic Unit.
c) Control unite.
d) Read Only Memory.
18- ROM is a_______.
a) Random Access Memory.
b) Arithmetic Logic Unit.
c) Control unite.
d) Read Only Memory.
19- ROM is a_______.
a) ALU.
b) CU.
c) Registers.
d) Primary Memory.
20- ___________ a permanent form of storage.
a) ALU.
b) CU.
c) ROM.
d) RAM.
21- ___________ stays active regardless of whether power supply to it is turned on or off.
a) ALU.
b) CU.
c) ROM.
d) RAM.
22- ___________ devices do not allow data stored on them to be modified.
a) ALU.
b) CU.
c) ROM.
d) RAM.
23- ___________ is a memory scheme within the computer system responsible for storing data on
a temporary basis.
a) ALU.
b) CU.
c) ROM.
d) RAM.
24- In___________ data will be erased once supply to the storage device is turned off.
a) ALU.
b) CU.
c) ROM.
d) RAM.
25- ___________ stores data randomly and the processor accesses these data randomly.
a) ALU.
b) CU.
c) ROM.
d) RAM.
26- In___________ you can access any memory cell directly if you know the row and column that
intersect at that cell.
a) ALU.
b) CU.
c) ROM.
d) RAM.
27- __________ Stores data and programs permanently.
a) Secondary Memory.
b) Primary Memory.
c) ROM.
d) RAM.

28- In__________data is retained after the power is turned off.


a) Secondary Memory.
b) Primary Memory.
c) ROM.
d) RAM.
29- __________ is part of a unit, often called a "disk drive,".
a) Hard drive.
b) Primary Memory.
c) Secondary Memory.
d) RAM.
30- __________ stores and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces.
a) Hard drive.
b) Primary Memory.
c) Secondary Memory.
d) RAM.
31- __________ is a disk drive that uses laser light as part of the process of reading or writing
data to or from optical discs.
a) ODD.
b) Flash Disk.
c) Secondary Memory.
d) RAM.

32- __________ are common types of optical media which can be read and recorded by such
drives.
a) CD, DVDs, and Blu-ray discs.
b) Flash Disk, and Blu-ray discs.
c) ROM and DVD.
d) RAM and CD.
33- CDs can store up to __________________.
a) 700 megabytes (MB).
b) 700 Kbytes (KB).
c) 7000 bytes (B).
d) 70 megabytes (MB).
34- DVDs can store up to __________________.
a) 8.4 megabytes (MB).
b) 8.4 Kbytes (KB).
c) 84 bytes (B).
d) 7.4 megabytes (MB).

35- Blu-ray discs can store up to _____________.


a) 50 (GB).
b) 50 Kbytes (KB)..
c) 50 bytes (B).
d) 50 megabytes (MB).

36- floppy disk can store up to _____________.


a) 1.44 (GB).
b) 1.44 Kbytes (KB)..
c) 1.44 bytes (B).
d) 1.44 megabytes (MB).

37- ____________ a storage module made of flash memory chips.


a) floppy disk.
b) DVDs.
c) CD.
d) Blu-ray.

38- ____________ have no mechanical platters or access arms.


a) floppy disk.
b) DVDs.
c) CD.
d) Blu-ray.

39- ____________ is any piece of computer hardware equipment used to communicate the results
of data processing carried out by an information processing system.
a) Output device .
b) Input device.
c) Main memory.
d) Secondary Memory.
40- ____________ is converts the electronically generated information into human readable form.
a) Output device .
b) Input device.
c) Main memory.
d) Secondary Memory.

41- ____________ is a generic term for organized collections of computer data and instructions.
a) Software .
b) Hardware.
c) Main memory.
d) Secondary Memory.
42- Software often broken into.
a) system and application software .
b) Hardware and Software.
c) Main and Secondary software.
d) CD and DVD Software.
43- ______________ is responsible for controlling, integrating, and managing the individual
hardware components of a computer system.
a) system software .
b) Hardware and Software.
c) application software.
d) DVD Software.
44- ______ a virus attaches itself directly to a .exe or .com file and enters the device while its
execution.
a) Polymorphic Virus.
b) Multipartite Virus
c) Non-Resident Virus.
d) File Infector Virus.
45- ______ If it gets installed in the memory, it keeps itself hidden.
a) Polymorphic Virus.
b) Multipartite Virus
c) Non-Resident Virus.
d) File Infector Virus.
46- ______ If it gets installed in the memory, it keeps itself hidden.
a) Overwrite Virus.
b) Boot Sector Virus
c) Direct Action Virus.
d) File Infector Virus.
47- ______ is a type of virus that infects the boot sector of floppy disks or the Master Boot
Record (MBR) of hard disks.
a) Overwrite Virus.
b) Boot Sector Virus
c) Macro Virus.
d) Spacefiller Virus.
48- ______ is either overwrites the existing program or copies itself to another part of the disk.
a) Overwrite Virus.
b) Boot Sector Virus
c) Macro Virus.
d) Spacefiller Virus.
49- ______ can attack both, the boot sector and the executable file of an already infected
computer.
a) Overwrite Virus.
b) Multipartite Virus
c) Macro Virus.
d) Spacefiller Virus.
50- System software consists of an _____________ and ___________.
a) Operating system and some fundamental utilities.
b) Operating system and Software.
c) Fundamental utilities and application software.
d) CD and DVD Software.
51- ______________ is used to accomplish specific tasks other than just running the computer
system.
a) System software .
b) Hardware and Software.
c) Application software.
d) DVD Software.
52- Application software may consist of a _____________ or ___________.
a) single program or small collection of programs.
b) Operating system program or Software program.
c) Fundamental utilities or application program.
d) CD or DVD program.
53- The basic unit used in computer data storage is called______.
a) Bite.
b) Byte.
c) KiloByte.
d) MB.

54- The decimal number system has ______.


a) Ten unique digits.
b) Nine unique digits.
c) Seven unique digits.
d) Six unique digits.

55- The binary number system has ______.


a) Two unique digits.
b) Ten unique digits.
c) Seven unique digits.
d) Nine unique digits.

56- The speed of Central Processing Unit (CPU) is measured by ______.


a) Hz.
b) B.
c) KB.
d) GB.
57- _____is the program that, after being initially loaded into the computer by a boot program .
a) OS.
b) DVD.
c) CD.
d) GB.
58- _____ is a programming language with strong abstraction from the details of the computer .
a) High-level programming language.
b) Low-level programming language.
c) First-level programming language.
d) Second-level programming language.
59- _____ requires an assembler for directly translating the instructions of the machine language.
a) Low-level programming language.
b) High-level programming language.
c) First-level programming language.
d) Second-level programming language.
60- A_____ is a data item whose value cannot change during the program's execution.
a) constant.
b) variable.
c) data.
d) information.

61- A_____ is a type of malicious software, or malware.


a) computer virus.
b) variable.
c) anti-virus.
d) information.
62- A_____ is a malicious software which self-replicates and attaches itself to other
files/programs.
a) computer virus.
b) variable.
c) anti-virus.
d) information.
63- _____ can execute secretly when the host program/file is activated.
a) computer virus.
b) variable.
c) anti-virus.
d) information.
64- _____ is a software which comprises programs or set of programs which can detect and
remove all the harmful and malicious software.
a) anti-virus.
b) variable.
c) computer virus.
d) information.
65- The strip at the bottom, with the clock to the right and the square, window shaped Start button
to the left, is called the___________.
a) Taskbar.
b) Desktop.
c) computer clock.
d) Start button.
66- ____________can be customized and can look different depending on which computer you’re
using..
a) Desktop.
b) Taskbar.
c) computer clock.
d) Start button.
67- ____________ are symbols for what programs you want to launch from your Desktop.
a) Icon.
b) File.
c) Folder.
d) Start button.
68- ____________ they are used to browse the internet in order to visit websites and search for
information.
a) Web Browsers.
b) File.
c) Folder.
d) Icon.
69- ____________ they are used to find the programs we want to launch.
a) Shortcuts.
b) File.
c) Folder.
d) Web Browsers.
70- ____________ they are used to keep a bunch of files all in the one place.
a) Folders.
b) Icons.
c) Shortcuts.
d) Web Browsers.
71- The _______is on the Taskbar at the bottom left-hand corner of your screen.
a) Start Menu.
b) Quick Launch icons.
c) notification area.
d) clock.
72- _______this displays the name of the user logged into the computer.
a) File Explorer.
b) Settings.
c) Power.
d) User.
73- _______is where you access the filing system of your computer to locate files and foldores.
a) Settings.
b) All apps.
c) File Explorer.
d) Programs.
74- _______is where you can change the settings of your computer.
a) Setting.
b) Programs.
c) User.
d) All apps.
75- _______is where you can shutdown, restart or even make your computer go to sleep.
a) Power.
b) Programs.
c) User.
d) Settings.
76- _______is where you can access all the programs on your computer.
a) All App.
b) Folders.
c) File Explorer.
d) Settings.
77- Press the _____at the top right of your keyboard once to close the start menu.
a) ESC key.
b) Ctrl key.
c) Alt key.
d) Fn key.
78- _____ list of all possible special characters with different font styles.
a) Character Map.
b) Internet Explorer.
c) Math input panel.
d) Notepad.
79- _____ used to surf the internet.
a) Internet Explorer.
b) Math input panel.
c) Notepad.
d) Paint
80- _____ allows you to manually input mathematical formula using free handwriting.
a) Math input panel.
b) Remote Desktop connection.
c) Notepad.
d) Paint
81- _____ the world’s most famous text editor.
a) Notepad.
b) Words.
c) Notepad.
d) Paint
82- _____ a simple editor for pictures.
a) Paint.
b) Words.
c) Math input panel.
d) Notepad
83- _____ hides the user's actual public IP address.
a) VPN.
b) Remote Desktop connection.
c) LAN.
d) Notepad
84- _____ captures a device's screen and mouse and keyboard inputs.
a) Remote desktop software.
b) Remote Desktop connection.
c) LAN.
d) Notepad
85- _____ enables you to take a customizable snapshot of part of your desktop.
a) Snipping tool.
b) Remote Desktop connection.
c) LAN.
d) Notepad
86- _____ it records your problems and saves as a picture.
a) Snipping tool.
b) Steps recorder.
c) LAN.
d) Notepad
87- _____ helps you manage your fax /scanner devices.
a) Snipping tool.
b) Steps recorder.
c) Windows fax and scan.
d) Notepad
88- _____ is used to change settings for Windows.
a) Snipping tool.
b) Steps recorder.
c) Control Panel.
d) Notepad
89- _____ nearly everything about how Windows looks and works.
a) Snipping tool.
b) Settings control.
c) Control Panel.
d) Notepad
90- _____ can be used to set up Windows.
a) Snipping tool.
b) Settings control.
c) Control Panel.
d) Notepad
91- _____ is the word processing component of the Microsoft Office Suite.
a) Word.
b) Paint.
c) Control Panel.
d) Notepad
92- _____ is used primarily to enter, edit, format, save, retrieve, and print documents.
a) Notepad
b) Word.
c) Paint.
d) Control Panel.
93- To save any file_____.
a) Shift + F12
b) F12.
c) Ctrl + P.
d) Ctrl + C.
94- To save a copy of any file_____.
a) Shift + F12
b) F12.
c) Ctrl + P.
d) Ctrl + C.
95- ___________can erase user data and ensure it can’t be recovered.
a) Wiper.
b) Bots.
c) Spyware.
d) Rootkits,
96- ___________is used to take down computer networks in public or private companies across
various sectors.
a) Wiper.
b) Bots.
c) Spyware.
d) Rootkits,
97- ___________is one of the major antivirus software which is most used.
a) Norton.
b) Bots.
c) Spyware.
d) Rootkits,
98- ___________is one of the major antivirus software which is most used.
a) F-Secure.
b) Keyloggers.
c) Spyware.
d) Worms,
99- ___________is one of the major antivirus software which is most used.
a) Keyloggers.
b) Spyware.
c) Kaspersky.
d) Worms,
100- ___________is one of the major antivirus software which is most used.
a) Keyloggers.
b) Spyware.
c) Bots.
d) AVAST.
101- ___________is one of the major antivirus software which is most used.
a) Keyloggers.
b) Spyware.
c) Bots.
d) Comodo.
102- To print any file_____.
a) Shift + F12
b) F12.
c) Ctrl + P.
d) Ctrl + C.
103- To Copy any file_____.
a) Shift + F12
b) F12.
c) Ctrl + P.
d) Ctrl + C.
104- To Paste any file_____.
a) Shift + F12
b) Ctrl + X.
c) Shift + V.
d) Ctrl + V.
105- To Cut any file_____.
a) Shift + X
b) Ctrl + X.
c) Shift + C.
d) Ctrl + C.
106- To Format Painter _____.
a) Ctrl +Shift + C , Ctrl +Shift + V
b) Ctrl + X, Shift + X.
c) Shift + C, Ctrl + C.
d) Ctrl + V, Shift + V.
107- To Font Type _____.
a) Ctrl +Shift + F ,
b) Ctrl + Shift + X.
c) Ctrl + Shift + H.
d) Ctrl + Shift + V.
108- To Font (Increase size) _____.
a) Ctrl +],
b) Ctrl +}.
c) Ctrl +).
d) Ctrl +>.
109- To Font (Decrease size) _____.
a) Ctrl +[,
b) Ctrl +{.
c) Ctrl +(.
d) Ctrl +<.
110- To Font Style (Bold) _____.
a) Ctrl +B,
b) Ctrl +U.
c) Ctrl +I.
d) Ctrl +P.
111- To Font Style (Italic) _____.
a) Ctrl +B,
b) Ctrl +U.
c) Ctrl +I.
d) Ctrl +P.
112- To Font Style (Underline) _____.
a) Ctrl +B,
b) Ctrl +U.
c) Ctrl +I.
d) Ctrl +P.
113- The standard default template used by Word is called _____.
a) Normal style,
b) Underline style.
c) Italic style.
d) Bold style.
114- Normal style includes page margins of _____.
a) one inch.
b) two inch.
c) three style.
d) four style.
115- The font face in Normal style is_____.
a) Time New Roma.
b) Calibri.
c) Arial.
d) Abadi.
116- The font size in Normal style is_____.
a) 16 point.
b) 14 point.
c) 11 point.
d) 12 point.
117- The Line spacing in Normal style is set at _____.
a) 1.00.
b) 1.04.
c) 1.08.
d) 1.1.
118- The space after each paragraph in Normal style is set at _____.
a) 4 point.
b) 6 point.
c) 8 point.
d) 12 point.
119- to use the “Undo” feature _____.
a) Ctrl +I.
b) Ctrl +X.
c) Ctrl +Z.
d) Ctrl +Y.
120- To use the “Redo” feature _____.
a) Ctrl +I.
b) Ctrl +X.
c) Ctrl +Z.
d) Ctrl +Y.
121- One of the biggest advantages of using Word is its ability to _____.
a) check the grammar and spelling.
b) Undo and Redo.
c) Copy and Paste.
d) Cut and Copy.
122- To Find an information _____.
a) Ctrl +F.
b) Ctrl +H.
c) Ctrl +K.
d) Ctrl +E.
123- To alignment paragraph (Left)_____.
a) Ctrl +F.
b) Ctrl +L.
c) Ctrl +K.
d) Ctrl +E.
124- To alignment paragraph (Centre)_____.
a) Ctrl +F.
b) Ctrl +L.
c) Ctrl +K.
d) Ctrl +E.
125- To alignment paragraph (Right)_____.
a) Ctrl +F.
b) Ctrl +L.
c) Ctrl +R.
d) Ctrl +E.
126- To turn on the display of the ruler select the “Ruler” option in the “Show” section of the__.
a) Draw ribbon.
b) View ribbon.
c) Review ribbon.
d) Layout ribbon.
127- The vertical ruler scrolls as the pages of the document scroll up and down _____.
a) up and down.
b) lift and right.
c) up and lift.
d) right and down.
128- we can also change the margins in the document by using the _____.
a) Layout ribbon.
b) Review ribbon.
c) Malling ribbon.
d) Insert ribbon.
129- _____is an electronic spreadsheet with numerous rows and columns.
a) MS-EXCEL.
b) WORD.
c) MALLING.
d) INSERT.
130- The address or name of a cell or a range of cells is known as______.
a) Cell reference.
b) External referencing.
c) Remote referencing.
131- Referencing the cell of other worksheets is known as ______.
a) Cell reference.
b) External referencing.
c) Remote referencing.
132- Referencing the cell of other programs is known as ______.
a) Cell reference.
b) External referencing.
c) Remote referencing.
133- ________provides the basic facilities like changing the font, size of text, editing the cells
in the spreadsheet, autosum, etc .
a) Home Tab.
b) Insert Tab.
c) Formulas.
d) Page layout.
134- ________ provides the facilities like inserting tables, pivot tables, images, clip art, charts,
links, etc.
a) Home Tab.
b) Page layout
c) Insert Tab.
d) Formulas.
135- ________ provides all the facilities related to the spreadsheet-like margins, orientation,
height, width, background etc.
a) Home Tab.
b) Page layout
c) Insert Tab.
d) Formulas.
136- ________ is a package of different in-built formulas/functions.
a) Home Tab.
b) Page layout
c) Insert Tab.
d) Formulas.
137- Any digital computer carries out _________functions.
a) 3.
b) 4
c) 5.
d) 6.
138- ______ is a virus which saves itself in the memory of the computer.
a) Overwrite Virus.
b) Boot Sector Virus
c) Memory-Resident Virus.
d) File Infector Virus.
139- ______ can easily infect other files because it is hidden in the memory and is hard to be
removed from the system.
a) Overwrite Virus.
b) Boot Sector Virus
c) Memory-Resident Virus.
d) File Infector Virus.

140- ______ a virus attaches itself directly to a .exe or .com file and enters the device while its
execution.
a) Overwrite Virus.
b) Boot Sector Virus
c) Direct Action Virus.
d) File Infector Virus.

141- ______ a virus attaches itself directly to a .exe or .com file and enters the device while its
execution.
a) Overwrite Virus.
b) Multipartite Virus
c) Program File Virus.
d) File Infector Virus.

142- ______ If it gets installed in the memory, it keeps itself hidden.


a) Overwrite Virus.
b) Multipartite Virus
c) Program File Virus.
d) File Infector Virus.

143- If a ___________ attacks your system, you are at risk of cyber threat..
a) Overwrite Virus.
b) Multipartite Virus
c) Macro Virus.
d) Spacefiller Virus.

144- __________one of the most harmful viruses.


a) Multipartite Virus
b) Macro Virus.
c) Spacefiller Virus.
d) Overwrite Virus.
145- __________can completely remove the existing program and replace it with the malicious
code.
a) Multipartite Virus
b) Macro Virus.
c) Spacefiller Virus.
d) Overwrite Virus.
146- Gradually __________ can completely replace the host’s programming code with the
harmful code.
a) Multipartite Virus
b) Macro Virus.
c) Spacefiller Virus.
d) Overwrite Virus.
147- _____________spread through spam and infected websites.
a) Polymorphic Virus
b) Macro Virus.
c) Spacefiller Virus.
d) Overwrite Virus.
148- _____________create a modified or morphed version of the existing program and infect
the system and retain the original code.
a) Polymorphic Virus
b) Macro Virus.
c) Spacefiller Virus.
d) Overwrite Virus.
149- _____________first infects a single file and then later spreads itself to other executable
files and programs.
a) Polymorphic Virus
b) Macro Virus.
c) Spacefiller Virus.
d) File Infector Virus.
150- The main source of _______________ are games and word processors.
a) Polymorphic Virus
b) Macro Virus.
c) Spacefiller Virus.
d) File Infector Virus.
151- ___________a rare type of virus which fills in the empty spaces of a file with viruses.
a) Email Virus
b) Macro Virus.
c) Spacefiller Virus.
d) File Infector Virus.
152- ___________a rare type of virus which fills in the empty spaces of a file with viruses.
a) Email Virus
b) Macro Virus.
c) cavity virus.
d) File Infector Virus.
153- ___________will neither affect the size of the file nor can be detected easily.
a) Email Virus
b) Macro Virus.
c) cavity virus.
d) File Infector Virus.
154- ___________ will neither affect the size of the file nor can be detected easily.
a) Email Virus
b) Macro Virus.
c) Spacefiller Virus.
d) File Infector Virus.
155- ___________ is a virus written in the same macro language as used in the software
program and infects the computer.
a) Email Virus
b) Macro Virus.
c) Boot Sector Virus.
d) File Infector Virus.
156- Mainly the source of ____________ is via emails.
a) Email Virus
b) Macro Virus.
c) Boot Sector Virus.
d) File Infector Virus.
157- ___________consists of malicious code.
a) Email Virus
b) Macro Virus.
c) Boot Sector Virus.
d) File Infector Virus.
158- ___________can be activated when a user clicks on a link in an email message.
a) Email Virus
b) Macro Virus.
c) Boot Sector Virus.
d) File Infector Virus.
159- ___________downloads an email attachment or interacts in some other way with the body
of an infected email.
a) Email Virus
b) Macro Virus.
c) Boot Sector Virus.
d) File Infector Virus.

160- ___________is software that uses encryption to disable a target’s access to its data until a
ransom is paid.
a) Ransomware,
b) Macro Virus.
c) Fileless Malware
d) File Infector Virus.
161- ___________doesn’t install anything initially, instead, it makes changes to files that are
native to the operating system.
a) Ransomware,
b) Macro Virus.
c) Fileless Malware
d) File Infector Virus.
162- ___________tracks a user’s surfing activity to determine which ads to serve them.
a) Adware,
b) Macro Virus.
c) Spyware
d) File Infector Virus.
163- ___________does not install any software on a user’s computer, nor does it capture
keystrokes.
a) Adware,
b) Macro Virus.
c) Spyware
d) File Infector Virus.
164- ___________disguises itself as desirable code or software.
a) Adware,
b) Macro Virus.
c) Spyware
d) Trojans.
165- ___________can take control of victims’ systems for malicious purposes.
a) Spyware
b) Trojans.
c) Adware,
d) Macro Virus.
166- ___________may hide in games, apps, or even software patches.
a) Macro Virus.
b) Spyware
c) Trojans.
d) Adware,
167- ___________target vulnerabilities in operating systems to install themselves into
networks.
a) Macro Virus.
b) Worms
c) Trojans.
d) Adware,
168- ___________is software that gives malicious actors remote control of a victim’s computer
with full administrative privileges.
a) Macro Virus.
b) Worms
c) Trojans.
d) Rootkits,
169- ___________is a type of spyware that monitors user activity.
a) Keyloggers.
b) Worms
c) Spyware.
d) Rootkits,
170- ___________have legitimate uses; businesses can use them to monitor employee activity
and families may use them to keep track of children’s online behaviors.
a) Keyloggers.
b) Worms
c) Spyware.
d) Rootkits,
171- ___________is a software application that performs automated tasks on command.
a) Keyloggers.
b) Bots.
c) Spyware.
d) Rootkits,
172- ___________is a type of malware with a single purpose.
a) Wiper.
b) Bots.
c) Spyware.
d) Rootkits,
173- ___________is one of the major antivirus software which is most used.
a) Keyloggers.
b) Spyware.
c) Bots.
d) McAfee.
174- ________ helps to perform different operations on a vast set of data.
a) Home Tab.
b) Page layout
c) Insert Tab.
d) Data Tab.
175- ________ helps to access data(s) from different sources as well, such as from Ms-Access,
from web, etc.
a) Review.
b) Page layout
c) Insert Tab.
d) Data Tab.
176- ________ provides the facility of thesaurus, checking spellings, translating the text, and
helps to protect and share the worksheet and workbook.
a) Review.
b) Page layout.
c) Insert Tab.
d) Data Tab.
177- ________ contains the commands to manage the view of the workbook, show/hide ruler,
gridlines, etc, freezing panes, and adding macros.
a) View.
b) Review.
c) Insert Tab.
d) Data Tab.
178- In Excel ______ sheets are already opened by default.
a) 1.
b) 2.
c) 3.
d) 4.
179- On the lowermost pane in Excel, you can find the ______of the current sheet.
a) name.
b) size.
c) color.
d) row.
180- On the left side of this sheet, the __________ sheets.
a) name of previous.
b) current.
c) new.
d) old.
181- To open a new workbook______.
a) Ctrl+N.
b) Ctrl+O.
c) Ctrl+S.
d) Ctrl+C.
182- To open a saved workbook ______.
a) Ctrl+N.
b) Ctrl+O.
c) Ctrl+S.
d) Ctrl+C.
183- To save a workbook ______.
a) Ctrl+N.
b) Ctrl+O.
c) Ctrl+S.
d) Ctrl+C.
184- To copy the selected cells ______.
a) Ctrl+V.
b) Ctrl+X.
c) Ctrl+S.
d) Ctrl+C.
185- To paste the copied cells ______.
a) Ctrl+V.
b) Ctrl+X.
c) Ctrl+S.
d) Ctrl+C.
186- To cut the selected cells ______.
a) Ctrl+W.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+C.
187- To close the workbook ______.
a) Ctrl+W.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+D.
188- To remove all the contents from the cell ______.
a) Delete.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+D.
189- To print the workbook ______.
a) Ctrl+P.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+D.

190- To undo ______.


a) Ctrl+Z.
b) Ctrl+Y.
c) Ctrl+V.
d) Ctrl+D.

191- The ______function basically returns the row number for a reference.
a) ROW(X, ).
b) ROW( ,X).
c) ROWS( ).
d) ROW( ).

192- The ______ function is used to return the number of rows in a cell range.
a) ROW(Y, X).
b) ROW( ,X).
c) ROW( ).
d) ROWS( ).

193- The ______function basically returns the column number for a reference.
a) COLUMN(X, ).
b) COLUMN( ,X).
c) COLUMNS( ).
d) COLUMN( ).

194- ______ returns the number of columns for a given cell range.
a) COLUMN(X, ).
b) COLUMN( ,X).
c) COLUMN( ).
d) COLUMNS( ).
195- ______ returns the smallest value for a given cell range.
a) LARGE().
b) SMALL().
c) ROWS( ).
d) COLUMNS( ).
196- ______ returns the largest value for a given cell range.
a) LARGE().
b) SMALL().
c) ROWS( ).
d) VLOOKUP( ).
197- A______ is a mathematical expression that computes the value of a cell.
a) formula.
b) function.
c) percentage.
d) division.
198- A______ is predefined formulas that are already in Excel.
a) formula.
b) function.
c) percentage.
d) division.
199- ______ carry out specific calculations in a specific order based on the values specified as
arguments or parameters.
a) formula.
b) function.
c) percentage.
d) division.
200- ______ is the function to count the number of characters in a specific cell.
a) LEN.
b) TRIM.
c) DATE.
d) percentage.

You might also like