Q1. How many types of Document Views are available in Word 2010?
(a) 3
(b) 4
(c) 5
(d) 6
(e) None of these
Q2. The blank white area near the edges of every page in a word document is known as a ________.
(a) cut mark
(b) margin
(c) new area
(d) gutter
(e) indent
Q3. Which of the following is a type of chart available in Excel?
(a) Area
(b) Doughnut
(c) Line
(d) All of the above
(e) None of these
Q4. Which of the following Office programs offers the animation feature?
(a) Word
(b) Excel
(c) PowerPoint
(d) Access
(e) None of these
Q5. In MS PowerPoint, what are visual movements referred to as when one slide changes to another?
(a) Slide movement
(b) Slide transition
(c) Slide change
(d) Slide transformation
(e) None of these
Q6. In MS Word, ______ is a predefined decorative text that you can add to a document.
(a) ClipArt
(b) SmartArt
(c) Charts
(d) WordArt
(e) Comment
Q7. Which of the following feature of Excel allows you to create small charts that you can insert in individual cells?
(a) Sparkline
(b) Slicer
(c) Macro
(d) All of the above
(e) None of these
Q8. In Excel, a new workbook contains _____ worksheets by default.
(a) One
(b) Three
(c) Five
(d) Ten
(e) Fifty
Q9. Which of the following protocols is considered connectionless?
(a) TCP
(b) UDP
(c) FTP
(d) SMTP
(e) IGMP
Q10. What is the current version of IMAP?
(a) IMAP version 2
(b) IMAP version 3
(c) IMAP version 4
(d) IMAP version 5
(e) IMAP version 6
Q11. The software that is used by search engine to search that Internet for documents using their Web addresses is known as _________.
(a) Bing
(b) MSN
(c) Spider
(d) Google
(e) Firefox
Q12. Which of the following software posts unwanted advertisements on client’s computer?
(a) Virus
(b) Malware
(c) Worm
(d) Adware
(e) Logic bombs
Q13. _________ is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
(a) Trojan horse
(b) Adware
(c) Spyware
(d) Worm
(e) Viruses
Q14. Selling and buying products and services in electronic mode is called ________.
(a) e-commerce
(b) e-banking
(c) e-learning
(d) online shopping
(e) e-governance
Q15. ________ ensure secure transfer of data over an unsecured network, such as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking
(d) Spoofing
(e) Cryptography