Microsoft Office Questions Practice Question and Answer
8 Q: In Microsoft Excel, a single file or document is called?
892 063bff0cab90600403be5d14f
63bff0cab90600403be5d14f- 1workbooktrue
- 2worksheetfalse
- 3Sheetfalse
- 4None of thesefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "workbook"
Q: What is the use of Animation Pane in MS Power Point 2010?
849 064940486cae316dfef720209
64940486cae316dfef720209- 1You can check spelling and grammarfalse
- 2You can see a list of animation applied to the slidetrue
- 3You can print the slidesfalse
- 4none of thesefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "You can see a list of animation applied to the slide"
Explanation :
1. Using the Animation pane in MS PowerPoint 2010 you can see a list of animations applied to the slide.
2. The Animation Pane is a tool that displays a list of animated objects on your slide.
Q: In MS Access 2010, a user can either create a _______ view or a new table in a _______ view.
842 064941eeac7d7c7e06717d1d1
64941eeac7d7c7e06717d1d1- 1Design, Datasheettrue
- 2Formula, printfalse
- 3text, numberfalse
- 4bookmark, hyperlinkfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Design, Datasheet"
Explanation :
1. In MS Access 2010, the user can create a new table in either Design View or Datasheet View.
2. Access 2010 is a database application design and deployment tool that you can use to keep track of important information. You can keep your data on your computer, or you can publish it to the Web - so that other people can access your database with a Web browser.
Q: M.S. Which chart cannot be created in Excel?
815 064ba3d90c3da05b2213df2f5
64ba3d90c3da05b2213df2f5- 17dtrue
- 2Piefalse
- 3Areafalse
- 4Stockfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "7d"
Explanation :
1. M.S. The following charts can be created in Excel.
- Column - Chart
- line chart
- Pie chart
- Donut chart
- Bar chart
- Area Chart
- XY (Scatter) chart
- Bubble chart
- Stock Chart
- Surface Chart
- Radar chart
- Combo chart
Q: Which things are used together to add duplicate slides in the presentation of PowerPoint?
809 064ba776ce2108a7239398525
64ba776ce2108a7239398525- 1Ctrl + Xfalse
- 2Ctrl + Nfalse
- 3Ctrl + Mtrue
- 4Ctrl + Zfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Ctrl + M"
Explanation :
1. In MS PowerPoint, CTRL+M is a shortcut key used to insert a blank slide after the currently selected slide.
2. MS PowerPoint is a presentation program used to display data with the use of pictures, graphs, etc. in the form of slides.
3. It was created by Robert Gaskins and Dennis Austin.
Q: Which of the following is not a type of Cyber Threat?
792 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: What is the use of the Shift + F3 shortcut key in MS Excel 2010?
790 064942018187426e04966df1c
64942018187426e04966df1c- 1To insert an imagefalse
- 2To open a new sheetfalse
- 3To save the current sheetfalse
- 4To include the functiontrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "To include the function"
Explanation :
1. What is the Shift + F3 shortcut key used in MS Excel 2010 to insert the insert function?
2. In the Function window, you can see all the functions available in Excel.
Q: The maximum zoom percentage in MS PowerPoint 2010 is:
770 064a566de8c254a4ceacec934
64a566de8c254a4ceacec934- 1100%false
- 2200%false
- 3400%true
- 4500%false
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "400%"
Explanation :
1. PowerPoint allows users to zoom in and zoom out from slides to help focus on specific sections.
2. It allows the entire slide to be viewed as a whole.
3. The maximum zoom supported by PowerPoint is 400%.
4. The minimum zoom supported by PowerPoint is 10%.