Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

The hexadecimal representation of 14 is _______________

-E

Add the following unsigned binary numbers: 0011 and 1101.

- 0000

Convert : (110)2 = ( __ )10.

-6

Add the following unsigned binary numbers: 10110110 and 01100010.

- 00011000

Add the following unsigned binary numbers: 101010 and 001111.

- 111001

Convert 110100101010 from binary to decimal.

- 3370

The 2’s complement of 15 is ____________

- 0001

Convert 101101 from binary to decimal.

- 45

Add the following unsigned binary numbers: 1111 and 0011.

- 0010

 A bit in a computer terminology means either 0 or 1.

- True

Add the following unsigned binary numbers: 0110 and 0101.

- 01011

Convert 01000010 from binary to decimal.

- 66

Convert 11101111 from binary to decimal.


- 239

Which of the following is not a binary number?

- 11E

The octal equivalent of 1100101.001010 is ______

- 145.12

Which of the following is the correct representation of a binary number?

- (000)2

The input hexadecimal representation of 1110 is _______________

-E

Convert 10100011 from binary to decimal.

- 163

Convert the binary equivalent 10101 to its decimal equivalent.

- 21

The binary equivalent of the decimal number 10 is __________

- 1010

Convert : (110)2 = ( __ )10.

-6

 A bit in a computer terminology means either 0 or 1.

- True

It is a combination of a black hat and a white hat hacker.

- Gray hat hacker      

Attack launched by a third-party computer by using someone else's computer to launch an attack, it
becomes far more difficult to track down the actual attacker. 
- Indirect attacks

Computers should work without having unexpected problems

- Reliability

The act of surreptitiously listening to a private conversation, typically between hosts on a network.

- Eavesdropping

It is the protection of personnel, hardware, programs, networks, and data from physical circumstances
and events that could cause serious losses or damage to data.

- Physical Security

File will not be displayed in normal list of files.

- Hidden

A mechanism helps in establishing proof of identification.

- Authentication

A class of malicious code that "detonates" or goes off when a specified condition occurs. 

- Logic bomb 

An unauthorized user gaining physical access to a computer (or part thereof) can perform many
functions, install different types of devices to compromise security, including operating system
modifications, software worms, key loggers, and covert listening devices. 

- Direct-access attacks

Two or more users work with the computer at the same time

- Multiuser

It means that assets are accessible to authorized parties at appropriate times.

- Availability

File may be viewed, copied, executed (if appropriate), but not changed.  It can be deleted.

- Read Only

File is (or is not) a candidate for backup.

- Archive
Someone who seeks and exploits weaknesses in a computer system or computer network, “a clever
programmer“.

- Hacker

___________ is a weakness which allows an attacker to reduce a system's information assurance.

- Vulnerability

A program that spreads copies of itself through a network. 

- Worm

The confidential information sent by A to B which is accessed by C without the permission or knowledge
of A and B.

- Integrity

Two or more parts of the same process running at the same time.

- Multithreading

Assurance that the systems responsible for delivering, storing and processing information are accessible
when needed, by those who need them

- Availability

A situation in which one person or program successfully masquerades as another by falsifying data and
thereby gaining an illegitimate advantage.

- Spoofing

To open a document, click the File tab and select ______

- Open

Which of the following is NOT a new feature in Word 2013?

- The Ribbon

To select text means to ___________ a block of text.

- highlight

Press ______ to move the insertion point to the beginning of the document.

- <Ctrl> + <Home>
How can you display hidden text, such as tabs and paragraph marks?

- Click the Show/Hide button in the Paragraph group of the Home tab on the Ribbon.

What is the Quick Access Toolbar?

- A customizable toolbar of common commands that appears above or below the Ribbon.

The _________ is a temporary storage place in the computer’s memory.

- Clipboard

How do you switch between multiple document windows?

- Click the document’s button on the Windows taskbar.

What is the default file extension for a document created in Word?

- .docx

This command allows you to see these hidden formatting marks. 

- Show/Hide    

You can close a document which one of the following ways?

- Click the document’s Close button.

Which key deletes text to the left of the insertion point?

- <Backspace>

Shows where text will appear when you begin typing.

- Insertion Point

Contains commands for working with the document, organized by tabs.

- Ribbon

Where can you find basic file management commands and program options?

- File tab

Contains buttons (icons) for common commands.


- Quick Access Toolbar

What key can you press to get help in Word 2013?

- <F1>

Deletes the character to the left of the insertion point

- Backspace key

This view displays your document as it will appear when printed and is best for working in documents
with images.

- Print Layout view

Display information about the current document and process.

- Status Bar

Rotates cell contents to a angle or vertically   

- Orientation

The _______________ provides the space for your worksheets and workbook elements such as charts.

- Application Window

Changes the space between the cell border and its content  

- Indent

______________ is a software program produced by Microsoft that allows users to organize, format and
calculate data with formulas using a spreadsheet system.

- Microsoft Excel

Displays your workbook in full-screen mode and completely hides the Ribbon.

- Auto-hide Ribbon
It contains multiple tabs, each with several groups of commands. You will use these tabs to perform
the most common tasks in Excel.

- Ribbon

Specifies where data is lined up within the cell   

- Alignment

In an _________ range, all cells touch each other and form a rectangle.

- Adjacent

Combines multiple cells into one cell.

- Merge

A ________ is a grid of rows and columns in which you enter text, numbers, and the results of
calculations. 

- Spreadsheet

A group of selected cells is called a _____.

- Range

_______ determines the best width for a column or the best height for a row.   

- Auto Fit

In the __________________, you can enter or edit data, a formula, or a function that will appear in a specific
cell.

- Formula bar

Which of the following is worksheet view of Microsoft Excel 2013?

- All of the above

The button that provides a shortcut to typing formulas.


- AutoSum

The ________________ lets you access common commands no matter which tab is selected.

- Quick Access Toolbar

Every worksheet is made up of thousands of rectangles, which are called _________.

- Cells

_______ appear vertically and are identified by letters.

- Column

It displays the location, or "name" of a selected cell.

- Name box

The file used to store worksheets is called a ________.  

- Workbook

It displays the location, or "name" of a selected cell.

- Name box

Slides that are unformatted and have no color scheme.   

- Blank

Each slide has an area where text and graphics are entered for a presentation.

- Work Area

Slide Themes that have design concepts, fonts, and color schemes.   

- Design

PowerPoint is best described as:


- Presentation software

You can change the format appearance of text and slides in the Slide View as well. Formatting can be
applied to all slides at the same time as in the Master View or only on an individual slide.

- Format Slide

It display the name of the open file.

- Title bar

This is a closed source commercial presentation program developed by Microsoft.   

- PowerPoint

To delete the slide currently displayed in the Slide Pane:

- Select the Delete Slide command             

To move a text placeholder, you:

- Click and drag on the placeholder's hashed border

Which key do you press to go into Slide Show view and always start on the first slide?

- F5

During a slide show, pressing the Esc key:

- Ends the slide show

The Slide Master View is located on the __________ ribbon.

- View

The following are Master Slide of Microsoft PowerPoint except;

- Presentation Master
_______________ are designated by dotted lines; they appear on a slide as guides, but they will not appear
on the finished presentation.

- Placeholders 

___________________ is a presentation application that enables an individual from any technical level to
create a dynamic and professional-looking presentation

- Microsoft PowerPoint 

____________ are visual special effects that you see when you move from one slide to the next.

- Transitions

PowerPoint has a set of Master Slides available for every Design Theme. The three Masters include a
Slide Master, Handout Master, and ______.   

- Notes Master

A Theme gives your slides a consistent appearance throughout your presentation.

- Design Theme

Display a snapchat of each slide.

- Thumbnail slide

These are designated by dotted lines; they appear on a slide as guides, but they will not appear on the
finished presentation.   

- Placeholder

Amount of data that can be transferred from one point to another in a certain time period

- Bandwidth

Type of Network Bridge and modem that provides bi-directional data communication via radio
frequency channels on a HFC and RFoG infrastructure

- Cable Modem Connection

Electronic transfer of data from one location to another.


- Data Communication

_______________ refers to an Internet connection that is established using a modem.

- Dial-up connection

Multiple pieces of data, sent simultaneously to increase the transmission rate  

- Broadband

Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited
amount of information can be transferred.    

- Narrowband

Electronic messages sent over the Internet can be easily snooped and tracked, revealing who is talking
to whom and what they are talking about.

- Theft of Personal information

It is a global system of interconnected computer networks that use the standard Internet protocol suite
(TCP/ IP) to serve billions of users worldwide.

- Internet

The main page that all of the pages on a particular Web site are organized around and link back to is
called the site’s ___________.     

- Home Page

It is the largest network in the world that connects hundreds of thousands of individual networks all over
the world.   

- Internet

A collection of linked Web pages that has a common theme or focus is called a Web site.    

- Website

Information is probably the biggest advantage internet is offering.

- True
It is now an essential communication tools in business.

- Email

You can access many ‘chat rooms’ on the web that can be used to meet new people, make new friends,
as well as to stay in touch with old friends.

- Online Chat

_______________ is an Internet utility software used to uploaded and download files.

- File Transfer Protocol

It is often viewed as the act of sending unsolicited email. This multiple or vast emailing is often
compared to mass junk mailings.

- Spamming

Amount of data that can be transferred from one point to another in a certain time period

- Attenuation

A commercial organization with permanent connection to the Internet that sells temporary connections
to subscribers.    

- Internet Service Provider (ISP)

Internet provides facility to access wide range of Audio/Video songs, plays films.

- Entertainment

It consists of information organized into Web pages containing text and graphic images.   

- World Wide Web

It is an electronic machine that follows a set of instructions in order that it may be able to accept and
gather data and transform these into information.

- Computer

What year did admiral Grace Murray Hopper finds a moth among the relays of a Navy computer and
calls it a “bug.”

- 1945

RAM stands for? 

- Random Access Memory


It is the general name for unanticipated or undesired effects in programs or program parts, caused by an
agent intent on damage.

- Malicious code 

1 TB is compose of?

- 1024 gigabytes

This describes a situation where information, thought as secure, is released in an untrusted environment.

- Information disclosure

Allows data and programs to be sent to the CPU.

- Input Device

DOS command to make directory

- MD

It is a unit of information equivalent to the result of a choice between only 2 possible alternatives in the
binary number system.

- Bit

They are known as crackers or dark-side hackers. Someone violating computer or Internet security
maliciously or for illegal personal gain.

- Black hat hacker      

This is the brain of the computer.

- CPU

What year did the first Microsoft Word-based virus, spreads worldwide using macro commands.

- 1995

It directs and controls the entire computer system and performs all arithmetic and logical operations.
- Central Processing Unit

Executes all arithmetic and logical operations. Arithmetic calculations like as addition, subtraction,
multiplication and division.

- Arithmetic Logic Unit

An electronic device, operating under the control of instructions stored in its own memory that can
accept data (input), process the data according to specified rules, produce information (output), and
store the information for future use

- Computer

The value of base in a decimal number system is ____________

- 10

A storage module made of flash memory chips.

- Flash Disk

The core of the OS.  Interacts with the BIOS (at one end), and the UI (at the other end).

- Kernel

It refers to the physical parts or components of a computer such as the monitor, mouse, keyboard,
computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory,
motherboard and chips), etc. all of which are physical objects that can be touched

- Hardware

It is a piece of software, a chunk of data, or sequence of commands that takes advantage of a
software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on
computer software, hardware, or something electronic (usually computerized).

- Exploits

A multi-user computer capable of supporting from 10 to hundreds of users simultaneously.

- Minicomputer
DOS command to remove a directory or an entire directory tree.

- RD

It is a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single
unit for information.

- Byte

It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of
your hand or in your pocket.

- Mobile Device

It is the processed and organized data presented in a meaningful form

- Information

_______________ mechanism helps in establishing proof of identification.

- Authentication

It primarily provides services for running applications on a computer system.

- Operating System

It is a collection of independent and unorganized facts.

- Data

Is responsible for controlling, integrating, and managing the individual hardware components of a
computer system so that other software and the users of the system see it as a functional unit without
having to be concerned with the low-level details.

- System Software

_________ of user identity describes a situation in which one person or program successfully masquerades
as another by falsifying data and thereby gaining an illegitimate advantage.

- Spoofing
The ROM stands for?

- Read Only Memory

___________ is a permanent form of storage

- ROM

The program is meant to make computers more efficient, but later hackers modify it into computer
viruses that destroy or alter data.

- Worm

The principle of ________________ specifies that only the sender and the intended recipient should be able
to access the content of the message.

- Confidentiality 

___________, a University of Southern California doctoral student, comes up with term “computer virus.”

- Fred Cohen

It is a generic term for organized collections of computer data and instructions

- Software

It is a battery or AC-powered personal computer that can be easily carried and used in a variety of
locations.

- Laptop

A powerful multi-user computer capable of supporting many hundreds or thousands of users


simultaneously.

- Mainframe

This is any peripheral (piece of computer hardware equipment to provide data and control signals to an
information processing system such as a computer or other information appliance.

- Input Devices
A ___________ in a computer system, is a method of bypassing normal authentication, securing remote
access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected.

- Backdoors

It is used to accomplish specific tasks other than just running the computer system.

- Application Software

The only language which the computer understands is ______________

- Binary Language

It is the tangible part of a computer system.

- Hardware

It is weakness which allows an attacker to reduce a system's information assurance.

- Vulnerability

It is the course of doing things in a sequence of steps.

- Data Processing

It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of
your hand or in your pocket.

- Mobile Device

This describes a situation where information, thought as secure, is released in an untrusted environment.

- Information disclosure

To sort data in Excel, go to the __________ ribbon.

- Data Insert

The numbers in Excel represent the...

- Cell
What is the control center located below the title bar at the top of the Microsoft Word window called?

- Ribbon

In which view Headers and Footers are visible

- Print Layout View

To save an existing document with a new file name or to save an existing document in a new location,
which command is used?

- Save As

In Excel, the name of the bar where information appears as you input data is called?

- Formula Bar

An operator is a symbol that indicates the type of calculation to perform on the operands, such as a plus
sign (+) for addition.     

- Operator

Moves data to a new line when the cell is not wide enough to display all the contents

- Wrap Text

An _________ is a constant (text or number) or cell reference used in a formula.

- Operator

To alert Excel that you are entering a formula and not text, type a  ____________ preceding the formula.

-=

The __________, or cell reference area, displays the cell reference of the active cell.

- Name Box    

On the View Ribbon, which command allows the document to be viewed as it would appear in a
multilevel outline?
- Print Layout

What is the cell in the worksheet in which you can type data?

- Active cell

The letters in Excel represent the...

- Columns

Work in ___________ when you need to organize and develop the content of your document.

- Outline view

Each cell is identified by a unique __________.

- Cell

Text-styling feature of MS word is

- WordArt

If I want to find an average of cells A1 through A25, which formula would I use?

- =average(A1:A25)

What does the mouse pointer look like in a spreadsheet?

- Selection cross

A number of letter that appears little above the normal text is called :

- Superscript

When creating a chart in Excel, what is the first thing you need to do?

- Choose a chart from the ribbon Select the data to be graphed.

When you reach the right margin, the text continues on the next line.  This feature is called _______.

- Word Wrap
This is activated by default. This allows you to scroll down both windows at the same time.

- Synchronous Scrolling

Which action would Drake take to insert the contents from the Office Clipboard into a document?

- Paste

To apply center alignment to a paragraph we can press

- Ctrl + E

The direction of a rectangular page for viewing and printing is called

- Orientation

Show how a document will look when it is printed.

- Print Layout

An Excel file format extension is

- xls

Text in Excel is automatically aligned _____________.

- Left

The cell in the worksheet in which you can type data is called the __________.

- Active Cell

To store a new or existing file with the same name, which button is used?

- Save

Excel refers to files as.

- Workbooks
It is the intersection of a row and a column

- Cell

_____ appear horizontally and are identified by numbers.

- Row

Short cut key to highlight all elements in a document.

- Ctrl + A

What function adds all of the numbers in a range of cells?

- Sum

What is the name assigned to a file when it is saved?

- File name

To save a new file or an existing file in its same storage location, which commonly used shortcut key or
keyboard key combination is used?

- CTRL+S

Which of the following actions or commands cannot be undone in Microsoft Word?

- Saving a document

_____________ adjusts the size of the windows so that they share the screen equally.

- Side by Side  

The intersection of a row and column.

- cell

This view is good for most simple word-processing tasks, such as typing, editing, and formatting.

- Draft view    
Microsoft Excel is what kind of software?

- Spreadsheet Software

 A ______ is a preset collection of design elements, including fonts, colors, and effects.    

- Theme

Which of the following is NOT a new feature in Word 2013?

- Backstage view

To specify the size of the viewable area and allow users to reduce or enlarge the size of a document
window, which command is used?

- Zoom

This view is optimized for reading on a portable device, such as a tablet or smart phone.

- Read Mode

Deletes the character to the right of the insertion point.

- Delete Key    

Display headings and text in outline form so you can see the structure of your document and reorganize
easily.

- Outline

The _____ begins with an equal sign (=).     

- Formula

You might also like