1.
In MS Excel, ______________ shortcut key is used to create chart?
Answer: Option 'C'
F11 In MS Excel, F11 key is used to create chart.
2.
Which of the following is personal digital assistant of MS Window 10?
Answer: Option 'C'
Cortana Cortana is personal digital assistant of MS Window 10.
3.
Which of the following format used in digital video?
Answer: Option 'B'
Frames Digital video consists of a series of image frames that are synchronized with an audio track.
4.
What is the default the cell content alignment in Excel?
Answer: Option 'C'
text left aligned and numbers right aligned
5.
Which of the following layer handles the LAN switching in OSI model?
Answer: Option 'A'
Data link Layer
6.
Which of the following statemen is correct regarding MS Excel?
I. Ctrl + I is used for italic highlighted selection
II. Ctrl +B is used for bold highlighted selection
III. Ctrl + Page up is used for move between excel worksheet in the same excel document
Answer: Option 'D'
All I, II & III are correct.
7.
——– are attempts by individuals to obtain confidential information from you to falsifying their identity.
Answer: Option 'A'
Phishing scams
8.
Which of the following is not an input device?
Answer: Option 'D'
Keyboard All the option given are input devices.
9.
Network components are connected to the same cable in the ……… topology
Answer: Option 'C'
Bus
10.
Which of the following is not the type of antivirus?
Answer: Option 'D'
Avamar Except (d), all are type of anti-virus.
11.
Bitdefender is an example of ________.
Answer: Option 'B'
Antivirus
12.
Translates low level assembly language mnemonic into machine code
Answer: Option 'B'
Compiler
13.
What is the use of bridge in network?
Answer: Option 'A'
To connect LANs
14.
A device that connects networks with different protocols
Answer: Option 'B'
Gateway
15.
Which virus deletes all the files that it infects?
Answer: Option 'B'
Overwrite Virus An overwriting virus (over writing infector) is a malicious program which, after infection, will effectively destroy the original program code, typically by overwriting data in the system’s memory (overwrites the host program).
16.
Which of the following isn’t a characteristic of High level languages?
Answer: Option 'A'
machine code High Level Language isn’t in machine language. It is converted to machine language for further processing.
17.
Which of the following is most oriented to scientific programming?
Answer: Option 'A'
FORTRAN Fortran is a
18.
Which of the following are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser?
Answer: Option 'D'
Adware Adwares are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser. Sometimes, hackers embed malware along with it to compromise systems. So, security professionals treat it as modern-day PUP (potentially unwanted programs).
19.
Which of the following is known as malicious software?
Answer: Option 'D'
Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware.
20.
Which of the following protocol deals with emails?
Answer: Option 'B'
SMTP Simple Mail Transfer Protocol