Computer Operation - MCQ - NSDA
Computer Operation - MCQ - NSDA
140. In addition to password protection, what other security feature can be used in Microsoft Word to
restrict editing?
A. Read-only mode C. Document Encryption
B. Track Changes D. Watermark
141. What action should take if you want to remove password protection from a Word document?
A. File tab > Remove Password
B. Review tab > Unlock Document
C. Save the document in a different file format
D. Review tab > Product Document > Remove Protection
142. The space between the margin and the start of a paragraph is called____
A. Blank space C. Negative space
B. Positive space D. Indentation
11 Computer Operation- Level 3
143. Which of the function bellow is used to send same letter to different recipient.
A. Macros C. Mail merge
B. Template D. Bibliography
144. If you want to check spelling and grammar error. Which key you should have press from
keyboard?
A. Shift + F7 C. Alt + F7
B. Ctrl + F7 D. F7
145. If you want to place a word with a character that is raised and smaller above the baseline which
one of the bellow you have to perform?
A. Subscript C. Strikethrough
B. Superscript D. Raised
146. In Microsoft Word, how can you insert a new table into you document?
A. Insert tab > Table > Insert Table C. Insert tab > Table > Add Table
B. Page Layout tab > Table > New Table D. Format tab > Table > Create Table
147. What is the advantage pf saving a document in the “RTF” (Rich Text Format) file format?
A. It supports macros and automation. C. It reduces the file size.
B. It preserves complex formatting. D. It allows password protection.
150. Which chart is used to visually compare values across a few categories?
A. Area Chart C. Doughnut Chart
B. Bar Chart D. Hierarchy Chart
151. Which commands is used to open Power Point directly (if installed) from the RUN dialog box in
Windows operating system
A. Powerpoint B. Powerpnt
12 Computer Operation- Level 3
C. Ppt D. Pptx
152. What is the keyboard shortcut to start the slideshow of a PowerPoint presentation?
A. F5 C. F12
B. Ctrl + F5 D. Ctrl + F12
156. A ______ is a central device that divides a network connection among several devices.
A. Switch C. Router
B. Hub D. Mode
Short Question:
1. What are the 3 virtual Video conferencing Platforms?
a. Ans: Zoom, Google Meet, Skype, Google Hangouts,
2. Write down the Top 5 cloud data storage services?
a. Ans: Google Drive, OneDrive, Dropbox, Mega, pCloud, Google Cloud Storage, Amazon
Cloud Drive,
3. Write down 10 (Ten) Cloud Storage Services Name?
Ans: Some Cloud Storage Services: Personal & Business Storage
1. Sync.com – Top cloud storage pick for sharing, versioning, large files, iphone and more
2. pCloud – Best online storage pick for Windows, Mac, Linux and music
3. Icedrive – Top cloud drive with excellent speeds
4. MEGA – Very secure service with the freest cloud storage (20GB)
5. IDrive – Best cloud storage online backup hybrid
6. OneDrive – Best cloud storage service for office integration
7. Google Drive – Top pick for integrated apps and students
8. Koofr – Top pick for multiple cloud accounts
9. Dropbox – Best pick for cloud collaboration
10. Box – Great pick for business cloud storage
6. What is Antivirus?
Ans: A computer antivirus, often referred to simply as an antivirus, is a software program designed
to detect, prevent, and remove malicious software, commonly known as malware, from a computer
system. Malware includes various types of harmful programs such as viruses, worms, Trojans,
ransomware, spyware, adware, and other malicious code.
The primary purpose of an antivirus is to protect your computer and data from being compromised
or damaged by malware. Antivirus software typically works by scanning files and programs on
your computer, looking for patterns or signatures that match known malware. It may also use
behavior-based analysis or heuristics to identify suspicious activities or code that may indicate the
presence of new or unknown malware.
7. What is CC and BCC in Email?
Ans: CC stands for "Carbon Copy" and BCC stands for "Blind Carbon Copy." These features allow
you to send copies of an email to additional recipients, either openly or covertly, without the
knowledge of the other recipients.
14 Computer Operation- Level 3
CC (Carbon Copy): When you CC someone on an email, it means you are sending them a copy
of the message for their information or reference. The primary recipients and other CC recipients
can see who else received the email, including the email addresses of all CC'd recipients. CC is
commonly used when you want to keep someone informed about the email's content or involve
them in the conversation without directly addressing the email to them.
BCC (Blind Carbon Copy): BCC works similarly to CC, but with an important distinction. When
you BCC someone, they receive a copy of the email, but their name and email address are not
visible to other recipients of the email, including the primary recipients and other BCC'd recipients.
This means that the recipients in the "To" and "CC" fields are unaware that the BCC recipient
received a copy of the email. BCC is often used when you want to maintain privacy or discretion,
such as when sending a mass email to a group of recipients who should not see each other's email
addresses.
A function, on the other hand, is a predefined operation or calculation built into Excel. Functions
are designed to perform specific tasks and can be used within formulas to simplify complex
calculations. They are represented by a function name followed by parentheses and may require
additional arguments or parameters to work correctly. Excel provides a wide range of built-in
functions, such as SUM, AVERAGE, IF, VLOOKUP, and CONCATENATE, among others. Each
function has a specific purpose and syntax, and they can be used to perform various operations on
data.
In summary, a formula is an expression that uses operators, cell references, numbers, and functions
to perform calculations, while a function is a predefined operation within Excel that can be used
as part of a formula to achieve specific tasks. Functions make it easier to perform common
calculations and reduce the complexity of formulas.
Ans: ꢀ = (ঞ+জ)
Ans-2: The Unicode Standard is the universal character representation stands for text in computer
processing Unicode provides a consistent way of encoding multilingual plain text making it easier to
exchange text files internationally.
Ans-3: Unicode is the universal character encoding standard that is maintained by the Unicode
Consortium, a standards organization founded in 1991 for the internationalization of software and
services.
BIOS
UEFI
Embedded Systems
Computer Peripherals
Computer Applications
17 Computer Operation- Level 3
27. How can you remove a manual page break in Microsoft word?
Hunts: Place the cursor just before the manual page breaks and press the Backspace or Delete key.