Microsoft Office Questions Practice Question and Answer

Q:

_______ are animation-like effects that occur when you move from one slide to another during an MS PowerPoint 2010 slide show.

1263 0

  • 1
    Control effect
    Correct
    Wrong
  • 2
    Bar graph
    Correct
    Wrong
  • 3
    Leide transition
    Correct
    Wrong
  • 4
    Slide background
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Leide transition"
Explanation :

1. Slide transitions are animation-like effects that occur when you move from one slide to another during an MSPowerPoint 2010 slide show.

2. Slide transitions apply whole-slide and can be used to make slide shows more vibrant and attractive.

Q:

In Microsoft Excel, a single file or document is called?

1242 0

  • 1
    workbook
    Correct
    Wrong
  • 2
    worksheet
    Correct
    Wrong
  • 3
    Sheet
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "workbook"

Q:

Which of the following is not a type of Cyber Threat?

1209 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

Q:

M.S. Which data types cannot be changed by the user in Access 2010? Choose the most appropriate option.

1178 0

  • 1
    Auto Text
    Correct
    Wrong
  • 2
    Date/Time
    Correct
    Wrong
  • 3
    Auto Number
    Correct
    Wrong
  • 4
    All of the Above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. " All of the Above"
Explanation :

In MS Access 2010, data types cannot be entered or changed by the user.

- Auto Text

- Date/Time

- Auto Number

Q:

M.S. Which chart cannot be created in Excel?

1178 0

  • 1
    7d
    Correct
    Wrong
  • 2
    Pie
    Correct
    Wrong
  • 3
    Area
    Correct
    Wrong
  • 4
    Stock
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "7d"
Explanation :

1. M.S. The following charts can be created in Excel.

- Column - Chart

- line chart

- Pie chart

- Donut chart

- Bar chart

- Area Chart

- XY (Scatter) chart

- Bubble chart

- Stock Chart

- Surface Chart

- Radar chart

- Combo chart

Q:

What is the use of Animation Pane in MS Power Point 2010?

1164 0

  • 1
    You can check spelling and grammar
    Correct
    Wrong
  • 2
    You can see a list of animation applied to the slide
    Correct
    Wrong
  • 3
    You can print the slides
    Correct
    Wrong
  • 4
    none of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "You can see a list of animation applied to the slide"
Explanation :

1. Using the Animation pane in MS PowerPoint 2010 you can see a list of animations applied to the slide.

2. The Animation Pane is a tool that displays a list of animated objects on your slide.

Q:

What is the use of the Shift + F3 shortcut key in MS Excel 2010?

1164 0

  • 1
    To insert an image
    Correct
    Wrong
  • 2
    To open a new sheet
    Correct
    Wrong
  • 3
    To save the current sheet
    Correct
    Wrong
  • 4
    To include the function
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "To include the function"
Explanation :

1. What is the Shift + F3 shortcut key used in MS Excel 2010 to insert the insert function?

2. In the Function window, you can see all the functions available in Excel.

Q:

Which things are used together to add duplicate slides in the presentation of PowerPoint?

1161 0

  • 1
    Ctrl + X
    Correct
    Wrong
  • 2
    Ctrl + N
    Correct
    Wrong
  • 3
    Ctrl + M
    Correct
    Wrong
  • 4
    Ctrl + Z
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Ctrl + M"
Explanation :

1. In MS PowerPoint, CTRL+M is a shortcut key used to insert a blank slide after the currently selected slide.

2. MS PowerPoint is a presentation program used to display data with the use of pictures, graphs, etc. in the form of slides.

3. It was created by Robert Gaskins and Dennis Austin.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully