How do you open a Search window from the Metro screen?
(A) Windows Key + S
(B) Click on the search tile
(C) Type the word search
(D) Window key + F
To open a Search window from the Metro screen (also known as the Start screen) in Windows 8 and later versions, you can press the Windows Key + S keyboard shortcut. This will bring up the Search charm, allowing you to search for apps, files, settings, and other content on your computer.
What is it called when more than one if-statement is used together?
(A) if-else statement
(B) nested statement
(C) more if statements
(D) None of the above
Modification of the work done in a cell is called-
(A) Editing
(B) range
(C) fixing
(D) none of the above
Actually, the modification of the work done in a cell in Excel is typically referred to as "editing" the cell, not "range." Editing a cell means changing or modifying the data or formula within that specific cell. A "range" in Excel refers to a group of two or more cells on a worksheet. When you edit a cell, you are making changes to the content of that particular cell.
The extension of MS Excel's workbook or file is-
(A) .DOC
(B) .XLX
(C) .XLC
(D) .XLSX
With which of the following is the Break statement used?
(A) if Statement
(B) else if Statement
(C) Switch Statement
(D) None of these
The number of rows in Excel 2003 is ______.
(A) 65535
(B) 65536
(C) 65534
(D) 65533
In Excel 2003, the number of rows is 65,536. Each worksheet in Excel 2003 consists of 65,536 rows and 256 columns.
Delayed payload of some virus is called-
(A) Time
(B) Anti-virus
(C) Bomb
(D) None of the above
In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.
What is virus that spreads in computer?
(A) It is hardware
(B) It is a computer program
(C) It is system software
(D) It is a windows tool
a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.
What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?
(A) Computer virus
(B) Phishing Scams
(C) Spyware Scams
(D) None of the above
When does Time Bomb happen?
(A) during a particular logic and data
(B) during a particular date or time
(C) during a particular time
(D) none of the above
it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.
Get the Examsbook Prep App Today