Microsoft Office Questions Practice Question and Answer

Q:

Mainly the following happens in Ms-outlook 2010?

414 0

  • 1
    Calendar
    Correct
    Wrong
  • 2
    Task Manager
    Correct
    Wrong
  • 3
    Contact Manager
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the above "
Explanation :

Ms-outlook 2010 mainly consists of the following.

- Calendar

- Task Manager

- Contact Manager

- All of the above

- Note taking

- A magazine

- Web browsing

Q:

Which of the following is not a type of Cyber Threat?

440 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

Q:

What is the extension of the file in Powerpoint 2010?

399 0

  • 1
    . Ppt
    Correct
    Wrong
  • 2
    . Ppx
    Correct
    Wrong
  • 3
    . Pptx
    Correct
    Wrong
  • 4
    . Ppxt
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. ". Pptx"
Explanation :

1. The file extension in PowerPoint 2010 is .pptx.

2. It is an open XML (Open XML) format used in PowerPoint 2007 and later versions.

3. .pptx files can also be opened with other presentation software, such as OpenOffice Impress, Google Slides, and Apple Keynote.

Q:

File menu in PowerPoint 2010 is also called?

793 0

  • 1
    leftstage view
    Correct
    Wrong
  • 2
    Backstage view
    Correct
    Wrong
  • 3
    Frontstage view
    Correct
    Wrong
  • 4
    Rightstage view
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Backstage view"
Explanation :

1. File menu in PowerPoint 2010 is also called Backstage View. This is a new interface that Microsoft introduced in Office 2010. In Backstage View, all the File menu options are organized in one place, making them easy to find and use.

2. The main creators of MS PowerPoint software are Robert Gaskins and Dennis Austin, which was launched in 1987.

3. Education, marketing, business, etc. are areas where PPT is extremely useful.

Q:

M.S. Which chart cannot be created in Excel?

482 0

  • 1
    7d
    Correct
    Wrong
  • 2
    Pie
    Correct
    Wrong
  • 3
    Area
    Correct
    Wrong
  • 4
    Stock
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "7d"
Explanation :

1. M.S. The following charts can be created in Excel.

- Column - Chart

- line chart

- Pie chart

- Donut chart

- Bar chart

- Area Chart

- XY (Scatter) chart

- Bubble chart

- Stock Chart

- Surface Chart

- Radar chart

- Combo chart

Q:

Which option is used for formatting the contents of a cell in Ms-excel?

347 0

  • 1
    Clipboard group notap
    Correct
    Wrong
  • 2
    Font group
    Correct
    Wrong
  • 3
    Alignment group
    Correct
    Wrong
  • 4
    Text
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Text"
Explanation :

1. In MS Excel, the text option is used for formatting the cell's content.

2. Under the formatting of text, alignment of the font in the cell, style of font, the colour of font, bold, italics, underline, fill colour, border colour, the format of numbers, format of date, format of decimal digits, wrap text ( Wrapping text), Shrink to fit, Orientation (vertically and horizontally), etc.

3. Use the following steps for formatting the text-

1. Select the cells or range that need to be formatted.

2. Select the Cell option from the Format menu on the menu bar.

3. You will get different tabs for different formats.

4. Click on the Font tab and do the formatting as required.

5. Finally click on the OK button.

Q:

Can it be kept in a cell of Microsoft Excel?

370 0

  • 1
    Number
    Correct
    Wrong
  • 2
    Text
    Correct
    Wrong
  • 3
    Formula
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the above "
Explanation :

Can be placed in a cell of Microsoft Excel.

- Number

- Text

- Formula

Q:

When the Tab key is pressed, how many space characters are inserted?

455 0

  • 1
    1
    Correct
    Wrong
  • 2
    2
    Correct
    Wrong
  • 3
    3
    Correct
    Wrong
  • 4
    4
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "4"
Explanation :

1. When the Tab key is pressed, 4 space characters are inserted.

2. The following are the tasks performed by the keyboard-

- With its help, alpha-numerical data is easily input into the computer.

- In the absence of a mouse, many of the tasks done by the mouse can be done.

- Through this, commands are given to the computer.

- By using the combination of buttons (shortcut keys) present in it, many operations can be performed, which saves a lot of time.

- Apart from this, tasks like playing games, controlling music etc. can be done.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully