Microsoft Office Questions Practice Question and Answer
8 Q: What is the shortcut key to open File Explorer or File Manager?
1167 06494296fc7d7c7e06717ec04
6494296fc7d7c7e06717ec04- 1Ctrl + Nfalse
- 2Ctrl + Otrue
- 3Ctrl + Efalse
- 4Ctrl + Ffalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Ctrl + O"
Explanation :
1. The shortcut key to open File Explorer or File Manager is Ctrl + O.
2. In Microsoft Excel and all other spreadsheet programs, pressing Ctrl+O brings up the Open window, allowing you to load an existing spreadsheet stored on your computer.
3. In Microsoft Word and other word processors, pressing Ctrl+O brings up the Open window, allowing you to load an existing document stored on your computer.
Q: In Microsoft Excel, a single file or document is called?
1139 063bff0cab90600403be5d14f
63bff0cab90600403be5d14f- 1workbooktrue
- 2worksheetfalse
- 3Sheetfalse
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "workbook"
Q: M.S. Which data types cannot be changed by the user in Access 2010? Choose the most appropriate option.
1127 064ba76fae2108a7239398507
64ba76fae2108a7239398507- 1Auto Textfalse
- 2Date/Timefalse
- 3Auto Numberfalse
- 4All of the Abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. " All of the Above"
Explanation :
In MS Access 2010, data types cannot be entered or changed by the user.
- Auto Text
- Date/Time
- Auto Number
Q: Which of the following is not a type of Cyber Threat?
1120 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: M.S. Which chart cannot be created in Excel?
1097 064ba3d90c3da05b2213df2f5
64ba3d90c3da05b2213df2f5- 17dtrue
- 2Piefalse
- 3Areafalse
- 4Stockfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "7d"
Explanation :
1. M.S. The following charts can be created in Excel.
- Column - Chart
- line chart
- Pie chart
- Donut chart
- Bar chart
- Area Chart
- XY (Scatter) chart
- Bubble chart
- Stock Chart
- Surface Chart
- Radar chart
- Combo chart
Q: What is the extension of the file in Powerpoint 2010?
1095 064ba3ebbe2108a7239385ad2
64ba3ebbe2108a7239385ad2- 1. Pptfalse
- 2. Ppxfalse
- 3. Pptxtrue
- 4. Ppxtfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. ". Pptx"
Explanation :
1. The file extension in PowerPoint 2010 is .pptx.
2. It is an open XML (Open XML) format used in PowerPoint 2007 and later versions.
3. .pptx files can also be opened with other presentation software, such as OpenOffice Impress, Google Slides, and Apple Keynote.
Q: In MS Access 2010, a user can either create a _______ view or a new table in a _______ view.
1093 064941eeac7d7c7e06717d1d1
64941eeac7d7c7e06717d1d1- 1Design, Datasheettrue
- 2Formula, printfalse
- 3text, numberfalse
- 4bookmark, hyperlinkfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Design, Datasheet"
Explanation :
1. In MS Access 2010, the user can create a new table in either Design View or Datasheet View.
2. Access 2010 is a database application design and deployment tool that you can use to keep track of important information. You can keep your data on your computer, or you can publish it to the Web - so that other people can access your database with a Web browser.
Q: What is the use of Animation Pane in MS Power Point 2010?
1085 064940486cae316dfef720209
64940486cae316dfef720209- 1You can check spelling and grammarfalse
- 2You can see a list of animation applied to the slidetrue
- 3You can print the slidesfalse
- 4none of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "You can see a list of animation applied to the slide"
Explanation :
1. Using the Animation pane in MS PowerPoint 2010 you can see a list of animations applied to the slide.
2. The Animation Pane is a tool that displays a list of animated objects on your slide.

