0% found this document useful (0 votes)
150 views20 pages

Acc Qna

Uploaded by

ipsitakundu02
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views20 pages

Acc Qna

Uploaded by

ipsitakundu02
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Accenture Theory Q&A

1) ______ view is not present in Power Point

Normal view

Slide Sorter view >

Slide Show view

Outline view

2) The space between the margin and the text is called ________.

Line spacing

Paragraph spacing

Indent >

Index

3) What is meant by "Document Area" in Microsoft word?

This is the area where the user types the text in Word document >

This is the area where the user controls the look and feel of the document.

This is the area where the user entered text is converted to document and closes the MS Word
application

Both A & B

4) Which of the following term is related with legends in MS Excel?

Clipart

Wood art

Operator

Chart >

5) Which of the following is a valid MS-Excel function?

ADD()

MINUS()

SUM() >
SUBTRACT()

6) In cut-paste operation of MS-Word

A text can be cut, and paste exactly once

A text can be cut, and paste multiple times >

A text can’t be cut if a background color is set

A text can’t be cut if its length is more than 128 characters

User

7) _______ is the blank space outside the printing area on a page.

Margin >

Header

Footer

Clip art

8) Which shortcut is used to move to the previous worksheet?

1. Alt+PgUP

2. Ctrl+PgUp >

3. Ctrl+PgDn

4. Shift + tab

9) Which of the following view options in MS Word shows the contents of a document as bulleted
points?

1. draft

2. Web Layout
3. Outline >

4. Print Layout

10) In MS PowerPoint, the shortcut Ctrl + M helps the user to

1. Open a new blank presentation

2. Apply bold to the selected text

3. Centre aligns the current selection

4. To Insert a new slide >

11) When working on an MS Excel sheet, to enter a formula in a cell, what should come before the
formula?

A. @

B. =

C.

D. &

1. C
2. B >

3. D

4. A

12) In MS-PowerPoint, which key on the keyboard can be used to view slide show?

F1

2. F2

3.F5 >

4. F10

13) Which of the following features is used to apply motion effects in between slide exits and another
enters?

Animation Scheme

Slide Design

Slide Transition >

Animation Objects

14) When you open a new Excel workbook, how many worksheets are there by default at the time of
opening?

1. One

2. Three >
3. Five

4. Seven

15) How do you save a presentation under a new file name?

1. Select the File menu and choose Save As >

2. When you close Power Point the file will automatically be saved

3. Select the File menu and choose Save

4. The file will automatically be saved under the new name when you change the title

16) Which of the following is the correct keyboard shortcut to open "Save as" dialog box in MS word? 1.

F12

2. Ctrl + V

3. Ctrl+F12 >

4. Alt+Ctrl + S

17) Which command is used to hold row and column titles in place so that they do not scroll when you
scroll a worksheet in MS Excel 20078

1. arrange all command on the view menu


2. freeze panes command on the view menu >

3. alignment command on the home menu

4. filter command on the home menu

User

18) __________option is not available in 'Cells' groups of Home tab in MS Excel 2007.

1. Insert

2. Format

3. Sort >

4. Delete

19) In MS-Word, which option divides a cell into several cells in a table?

1. Merge cells

2. Split cells >

3. Split table

4. Autofit

20) Which shortcut key is used to print a word document?


Ctrl + P >

2. Ctrl + B

3. Ctrl+A

4. Ctrl + shift + P

21) Which of the following shortcut key is used to paste the clipboard contents in an MS Word
document?

1. Ctrl + Z

2. Ctrl + X

3. Ctrl+V >

4. Ctrl+C

22) A_________is a pre-formatted container on a slide for content (text, graphics, or video) in MS

1. Cascade

2. Watermark

3. Placeholder >
4. Macros

23) Which of the given options best matches the items of LIST-1 with the items of LIST-2 with reference
to editing cells in a spreadsheet?

LIST-1 LIST-2

(i) Enter (a) moves you to the next cell to the right

(ii) Shift + tab (b) moves you to the next cell down

(iii) Tab (c) moves you in the direction of the arrow

(iv) Arrow key (d) moves you to the next cell to the left

1. (i)-b, (ii) a, (iii)-d, (iv) - c

2.(i)-b, (ii)-d, (iii) a, (iv) - c

3. (i)c, (ii)-d, (iii) - a, (iv) - b

4. (i)a, (ii)-d, (iii) - b, (iv) - c

24) Which among the following is not an edition of MS Word?

1. MS Word 2010

2. MS Word 2016
3. MS Word 2007

4. MS Word 1900 >

User

25) Which of the following statements are correct?

1. Colour and Pattern used to fill a closed shape is called WordArt

2. Menu bar is located below the title bar

3 The Select object browser button is located below the vertical scroll bar

4. The thesaurus tool finds Synonyms and antonyms

26) Choose the correct answer from the options given below.

1. Only 1 & 2

2. Only 2 & 3

3. Only 1 & 4

4. Only 2, 3 & 4 >

27) Vihan made a Powerpoint presentation for his college project and submitted it to his mentor for
review. His mentor told him that he has made some changes and has left some comments for him.
Which of the following things Vihan cannot do to this ppt now?

1. None of the mentioned options

2 He cannot merge his own ppt with the ppt shared by his mentor

3. He cannot roll-back the changes made by his mentor >

4 He cannot review the changes with respect to the comments left.

28) Tenzin is having a presentation in his school. He is using MS Powerpoint to build up his presentation.
To make his presentation look attractive, he is looking to add some of the file formats to his PowerPoint
shows.

1. XPS

||. JPG

III. THMX

IV. PPA

29) The file formats that he won't be able to add among the above file formats are

1. None of the mentioned options


2 |||

3 ||&IV >

4 III & IV

30) Consider the given URL: http://www.abc.org/rfc/rfc123.txt

"Http" of the given URL is called

1. Subdomain

2. Folder

3. Host

4. Protocol >

31) Which of the following software applications allows a user to view a webpage?

1. Notepad

2. Adobe Acrobat

3. Google Drive

4. Internet Explorer >


32) Using which of the following sites, users can interact with each other through messages?

1. SnapChat

2. Gmail

3. All of the mentioned options >

4 Facebook

33) Which of the following functions are provided by an Antivirus software?

1. It scans the directories or specific files for any malicious pattern and indicates the presence of
malicious software

2. It allows users to schedule scans so that they run automatically

3 If it detects any malicious software, if removes them

Choose the correct answer from the options given below

1. Only 1

2. Only 1, 2 and 3 >

3. Only 1 and 2
4. Only 3

34) Which of the following functions is used to create a drop-down box in selected cells?

1 Data > Conditional Formatting

2. Data > Data Validation >

3. Pivot Table

4. Data Filter

35) What is the difference between a Trojan and a Virus?

1. A Virus replicates itself while a Trojan does not >

2. They are different names for the same thing

3. None of the mentioned options

4. A Virus starts as a Trojan and spreads later

36) Which of the following groups is not present under the Insert tab in MS-Excel?

1. Charts

2. Text
3. Sort & Filfet >

4. Tables

37) Which of the following functions will help to find the number of working days between two calendar
dates?

1 Business days

2. Networkdays >

3. Days

4. None of the mentioned options

38) The XML-based and macro-ended file format for Excel 2007-2013 which stores VBA macro code or
Excel 4.0 macro sheets should be saved with which extension?

1 .xlsm >

2. .xlsx

3. .xlsb

4 .xltx

39) Which of the following is the incorrect representation of the layer number of an OSI model?

• Layer 6 is the presentation layer


Layer 4 is the session layer >

• Layer 3 is the network layer

Layer 2 is the data link layer

40) Which of the following is not vulnerability of the network layer ?

1. Raute spoofin

2. Identity & Resourse ID Vulnerability

3: IP Address Spoofing

4. Weak or non-existent authentication >

41) Which of the following options shows the correct relationsheep between the command and its
description?

-D(blind address: port:) connect to the target host using an ssh connection and then establishing a toto

-pport: Allows remote hosts to connect to local forwarded ports >

-j[user host[:port]:Allow remote hosts to connect to local forwarded ports.

None of the mentioned

42) Read the two statements and choose the right option.
1. You can translate left to right languages in MS word

ii. You can not translate right to left languages in MS word.

Statements i is false and statements it is true.

Both statements are true. >

Statements i is true and statements ii is false.

Both statements are false.

User

43) In order to adjust any row's height in a spreadsheet, which of the following key combinations can be
used ?

Alt+A+O+H >

All+N+O+H

Alt+H+O+H

Alt+M+O+H

44) Which of the following statements is not true about cloud and data center?

Options

a : Business pays directly for planning, people hardware, software and environment in data center. >
b : Cloud's location is virtualized and has remote hardware.

c : Data center has the ability of being instabtly scalable.

d : In-house IT professionals are available in case of data centers

45) Which of the following cloud service provider does not provide application lifecycle management?

Options

a : Azure

b : Google cloud platform

c : AWS

d : All of the mentioned provides this service >

46) Which of the following attacks treats the encryption algorithm as a black box ?

Options

a : Implementation attacks

b : Social engineering attack

c : Brute-foce attack

d : Analytical attack >

47) Questions 6: The zoom range in MS-Excel is:

Options

a : 10% to 400% >

b : 100% to 400%

c : 100% to 200%

d : 10% to 200%

48) Antivirus scanning devices fall under which type of network security device?

Options

a : Active devices >

b : Preventative devices
c : Unified Threat Management devices

d : Passive devices

49) Which of the following is the correctly mapped relationship between attributes and cloud or data
centre?

Options

a : In house IT professionals: Data center, Co-location makes failures dependent: cloud

b : Instant Scalable: Data Center, Pay as per use: cloud

c : On-premises: Data center, Remote Hardware: Cloud

d : Involves challenges and delay in Scalability: Data Center, Remote Hardware: Cloud

50) Consider a situation when you have to choose between the major cloud service providers. Which
would you choose if you need a cloud service if you do not want to have backup support?

Options

a : AWS

b : Oracle

c : Azure

d : Google Cloud >

51) Which of the following types of network security ensures that potential attackers cannot infiltrate
your network?

Options

a : Firewall

b : Network Access Control

c : Virtual Private Network >

d : Both Network Access Control and Virtual Private Network

52) Consider a situation where you have to choose between the major cloud service providers. Which
would you choose if you want support for Linux, Windows Server, and SQL Server and enhanced
security?

Options
a : Oracle

b : Google Cloud

c : Azure >

d : Alibaba cloud

53) An attack in which the user receives an unwanted amount of emails is _________.

Options

a : Smurfing

b : Denial of Service

c : E-mail bombing >

d : Ping storm

54) Which of the following statements is true about cloud and data center?

1. In Cloud, owner is responsible for downtime and repairs

2. In Data center, owner is responsible for downtime and repairs

Choose the correct answer from the options given below.

Options

a : Neither 1 nor 2

b : Only 2 >

c : Only 3

d : Both 1 and 2

55) DES Encryption algorithm is an example of which of the following options?

Options

a : Bit-oriented cipher >

b : All of the mentioned options

c : Byte-oriented cipher

d : Key-alternating block ciphers


56) How many processes are there for changing a plaintext piece of data into encrypted data in AES -
128?

Options

a : 14

b:8

c : 12

d : 10 >

57) Which of the following cloud service providers should be preferred if most of your data is of Binary
large objects type?

Options

a : Oracle

b : Azure

c : Google Cloud Platform

d : AWS >

You might also like