Tuesday, 4 April 2017


Q1. How many types of Document Views are available in Word 2010?  
(a) 3
(b) 4
(c) 5
(d) 6
(e) None of these 

There are 5 types of Document Views in Word 2010 which allow you to view your document in different ways, including Full Screen Reading, Print Layout, Web Layout, Outline and Draft. 

Q2. The blank white area near the edges of every page in a word document is known as a ________.
(a) cut mark 
(b) margin 
(c) new area 
(d) gutter 
(e) indent

Margins refer to the blank white areas near the edges of a page. Every page has top, bottom, left and right margins. The area surrounded by these four margins where you write, edit, and format the text is known as the text area. Therefore, if you increase or decrease the margin of a page, you get less or more space for writing text. 

Q3. Which of the following is a type of chart available in Excel?  
(a) Area 
(b) Doughnut 
(c) Line 
(d) All of the above 
(e) None of these 

A chart is used to represent a data graphically through symbols. The commonly used charts in Excel are line bar, area doughnut and pie. 

Q4. Which of the following Office programs offers the animation feature?  
(a) Word 
(b) Excel 
(c) PowerPoint 
(d) Access 
(e) None of these 

Animation refers to a process of creating an illusion of motion of static images. This feature is available in the PowerPoint application of Office Suite. 

Q5. In MS PowerPoint, what are visual movements referred to as when one slide changes to another?  
(a) Slide movement 
(b) Slide transition 
(c) Slide change 
(d) Slide transformation 
(e) None of these 

The transition from one slide to another in PowerPoint is known as slide transaction. 

Q6. In MS Word, ______ is a predefined decorative text that you can add to a document.  
(a) ClipArt 
(b) SmartArt 
(c) Charts 
(d) WordArt 
(e) Comment

WordArt includes predefined and pre decorated text that can be added to a document for enhancing its appearance. You can also customise the font size and font colour of the WordArt.

Q7. Which of the following feature of Excel allows you to create small charts that you can insert in individual cells?  
(a) Sparkline 
(b) Slicer 
(c) Macro 
(d) All of the above 
(e) None of these 

Spark lines are mini charts that you can place inside a cell of a worksheet to represent numerical data. They also allow you to quickly recognise time-based trends or variants in data. 

Q8. In Excel, a new workbook contains _____ worksheets by default. 
(a) One 
(b) Three 
(c) Five 
(d) Ten 
(e) Fifty 

A new workbook contains only three worksheets, namely, Sheet1, Sheet2 and Sheet3, by default. You can rename your worksheets at any point according to your requirements. 

Q9. Which of the following protocols is considered connectionless?  
(a) TCP
(b) UDP
(c) FTP
(d) SMTP
(e) IGMP

UDP is a connectionless protocol present on the transport layer.

Q10. What is the current version of IMAP?  
(a) IMAP version 2 
(b) IMAP version 3 
(c) IMAP version 4 
(d) IMAP version 5 
(e) IMAP version 6 

IMAP is an application layer protocol that allows an e-mail client to access an e-mail on remote mail server. The current version, IMAP version 4, is defined by RFC 3501. 

Q11. The software that is used by search engine to search that Internet for documents using their Web addresses is known as  _________.
(a) Bing 
(b) MSN
(c) Spider 
(d) Google 
(e) Firefox 

Spider is an important element of a search engine that browses the Internet in a systematic manner.

Q12. Which of the following software posts unwanted advertisements on client’s computer?   
(a) Virus 
(b) Malware 
(c) Worm 
(d) Adware 
(e) Logic bombs 

Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.

Q13. _________ is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.  
(a) Trojan horse 
(b) Adware 
(c) Spyware 
(d) Worm 
(e) Viruses 

Trojan horse is a malicious program which looks like a normal program and is accompanied with useful application like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.

Q14. Selling and buying products and services in electronic mode is called ________.
(a) e-commerce 
(b) e-banking 
(c) e-learning 
(d) online shopping 
(e) e-governance 

E-commerce refers to the electronic mode of selling and buying products and services.

Q15. ________ ensure secure transfer of data over an unsecured network, such as the Internet.  
(a) Antivirus 
(b) Hacking 
(c) Cracking 
(d) Spoofing 
(e) Cryptography 

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.