0% found this document useful (0 votes)
40 views27 pages

Practice Questions

Practice Questions

Uploaded by

mohamed orif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views27 pages

Practice Questions

Practice Questions

Uploaded by

mohamed orif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Practice Questions

Lecture 1 Questions
Question 1: What is the primary purpose of an operating system in a computer?

• A) To provide games for entertainment


• B) To manage the computer's hardware and software resources
• C) To facilitate internet browsing only
• D) To charge the computer's battery
• Correct Answer: B) To manage the computer's hardware and software resources

Question 2: Which of the following is considered the "brain" of the computer?

• A) The keyboard
• B) The monitor
• C) The microprocessor
• D) The mouse
• Correct Answer: C) The microprocessor

Question 3: What is the role of application software on a computer?

• A) To cool down the hardware components


• B) To perform specific user-oriented tasks
• C) To clean the computer's screen
• D) To increase the weight of the computer
• Correct Answer: B) To perform specific user-oriented tasks

Question 4: Which type of memory loses its content when the power is turned
off?

• A) Hard Disk
• B) Solid-State Drive (SSD)
• C) Read-Only Memory (ROM)
• D) Random Access Memory (RAM)
• Correct Answer: D) Random Access Memory (RAM)

Question 5: Input devices translate data into a form that is understandable by


the computer. Which of the following is an input device?
• A) Printer
• B) Speaker
• C) Keyboard
• D) Monitor
• Correct Answer: C) Keyboard

Question 6: Secondary storage is essential for holding data long-term. Which of


these is a form of secondary storage?

• A) RAM
• B) The CPU
• C) Hard disk
• D) The motherboard
• Correct Answer: C) Hard disk

Question 7: What is a utility program?

• A) A type of game software


• B) Software that performs computer maintenance tasks
• C) A program that increases the computer's processing speed
• D) A social media application
• Correct Answer: B) Software that performs computer maintenance tasks

Question 8: What does the term "embedded operating system" refer to?

• A) An operating system that is physically embedded into computer hardware


• B) An OS used primarily in embedded computer systems for specific tasks
• C) An OS that can only be used when connected to the internet
• D) An OS designed exclusively for desktop computers
• Correct Answer: B) An OS used primarily in embedded computer systems for specific
tasks

Question 9: What device driver's primary function?

• A) To increase the volume of the speakers


• B) To enable the operating system to communicate with hardware devices
• C) To protect the computer from viruses
• D) To drive the computer's fan
• Correct Answer: B) To enable the operating system to communicate with hardware
devices

Question 10: Which of the following best defines software?

• A) Physical parts that you can touch and see


• B) Instructions or programs that tell the computer what to do
• C) A tool used for opening the computer case
• D) The manual that comes with the computer
• Correct Answer: B) Instructions or programs that tell the computer what to do

Question 11: What is the primary function of the World Wide Web?

• A) To provide a platform for email communication


• B) To enable the sharing of information through documents linked by hyperlinks
• C) To facilitate peer-to-peer file sharing
• D) To secure private networks over the Internet
• Correct Answer: B) To enable the sharing of information through documents linked by
hyperlinks

Question 12: What technology is essential for connecting different devices over
the Internet?

• A) USB cables
• B) Bluetooth
• C) Network Protocols
• D) HDMI
• Correct Answer: C) Network Protocols

Question 13: What represents a significant impact of cloud computing?

• A) Reduced need for physical storage devices


• B) Increased requirement for on-premise data centers
• C) Decreased internet usage
• D) The decline of mobile devices
• Correct Answer: A) Reduced need for physical storage devices

Question 14: Which device is NOT considered part of the Internet of Things
(IoT)?

• A) A smart refrigerator
• B) A desktop calculator
• C) A fitness tracker
• D) An autonomous vehicle
• Correct Answer: B) A desktop calculator

Question 15: Who typically assumes the role of developing and maintaining
websites and web resources?

• A) Network Administrator
• B) Software Engineer
• C) Webmaster
• D) Technical Writer
• Correct Answer: C) Webmaster

Question 16: What project is credited with laying the foundational work for the
Internet in 1969?

• A) Microsoft Windows
• B) The World Wide Web Consortium (W3C)
• C) ARPANET
• D) IBM PC Development
• Correct Answer: C) ARPANET

Question 17: Which device is a primary tool for accessing Internet resources?

• A) Calculator
• B) Browser
• C) Printer
• D) Fax Machine
• Correct Answer: B) Browser

Question 18: What is NOT a common type of file found on the Web?

• A) Document File
• B) Worksheet File
• C) Database File
• D) Hardware File
• Correct Answer: D) Hardware File

Question 19: What concept involves the sharing of information via a network like
the Internet?

• A) Connectivity
• B) Isolation
• C) Segmentation
• D) Centralization
• Correct Answer: A) Connectivity

Question 20: Which of the following is not a force of technology mentioned in the
presentation?

• A) Cloud Computing
• B) Wireless Technology
• C) Print Media
• D) Internet of Things (IoT)
• Correct Answer: C) Print Media
Lecture 2 Questions
Question 1: What is the primary function of connectivity in terms of computing?

• A) Enhancing the physical appearance of devices


• B) Sharing of information via a communications system
• C) Increasing the processing speed of computers
• D) Improving the battery life of mobile devices
• Correct Answer: B) Sharing of information via a communications system

Question 2: Which of the following is considered the largest network?

• A) A corporate intranet
• B) A home Wi-Fi network
• C) The Internet
• D) A school's computer lab network
• Correct Answer: C) The Internet

Question 3: What has cloud computing enabled users to access more of?

• A) Physical computers
• B) Internet resources
• C) Paper documents
• D) Local storage devices
• Correct Answer: B) Internet resources

Question 4: Wireless technology has significantly changed the way we:

• A) Perform physical exercises


• B) Communicate
• C) Cook food
• D) Travel
• Correct Answer: B) Communicate

Question 5: The Internet of Things (IoT) allows which of the following to


communicate?

• A) Only computers and smartphones


• B) All types of devices
• C) Only kitchen appliances
• D) Only wearable devices
• Correct Answer: B) All types of devices
Question 6: What is the role of a Webmaster?

• A) Repairs computer components


• B) Prepares food in a cafeteria
• C) Develops and maintains websites
• D) Drives a school bus
• Correct Answer: C) Develops and maintains websites

Question 7: Which project initiated the development of a national computer


network in the United States in 1969?

• A) World Wide Web


• B) Google
• C) ARPANET
• D) Microsoft
• Correct Answer: C) ARPANET

Question 8: What does a browser provide access to?

• A) Only email services


• B) Web resources
• C) Local files on a computer
• D) Printers and scanners
• Correct Answer: B) Web resources

Question 9: The part of a URL that specifies the location or address of a resource
is known as the:

• A) Protocol
• B) Domain name
• C) Browser
• D) Operating system
• Correct Answer: B) Domain name

Question 10: Which type of email system requires installation on a computer?

• A) Web-based email
• B) Client-based email
• C) Cloud-based email
• D) Server-based email
• Correct Answer: B) Client-based email

Question 11: Which term describes the interconnected mesh of computers and
data lines known as the Internet?
• A) The Web
• B) The Cloud
• C) Network
• D) The Mesh
• Correct Answer: C) Network

Question 12: What year was the World Wide Web introduced?

• A) 1969
• B) 1985
• C) 1991
• D) 2000
• Correct Answer: C) 1991

Question 13: The Internet and the Web are:

• A) Exactly the same.


• B) Completely unrelated.
• C) Different, where the Internet is a physical network and the Web is a service on it.
• D) Two competing technologies developed by different countries.
• Correct Answer: C) Different, where the Internet is a physical network and the Web is a
service on it.

Question 14: What is the primary protocol used for web traffic?

• A) FTP
• B) HTTP
• C) SMTP
• D) HTTPS
• Correct Answer: D) HTTPS

Question 15: A ".gov" top-level domain (TLD) indicates a website is associated


with:

• A) Commercial entities.
• B) Educational institutions.
• C) Government entities.
• D) Network services.
• Correct Answer: C) Government entities.

Question 16: What distinguishes client-based email from web-based email?

• A) Client-based email can only send messages, while web-based can send and receive.
• B) Client-based email requires software installation on a computer.
• C) Web-based email cannot handle attachments.
• D) Client-based email is less secure than web-based email.
• Correct Answer: B) Client-based email requires software installation on a computer.

Question 17: What is SPAM primarily known as?

• A) A type of computer virus.


• B) Unsolicited or unwelcome email.
• C) A useful tool for email organization.
• D) An instant messaging service.
• Correct Answer: B) Unsolicited or unwelcome email.

Question 18: The CAN-SPAM Act is related to:

• A) Cyberbullying prevention.
• B) Email marketing regulations.
• C) Social media privacy.
• D) Online shopping security.
• Correct Answer: B) Email marketing regulations.

Question 19: Which application is NOT typically included in general purpose


applications?

• A) Database management systems


• B) Word processors
• C) Antivirus software
• D) Presentation programs
• Correct Answer: C) Antivirus software

Question 20: What does GUI stand for, and what does it allow users to do?

• A) General User Interface; it allows users to input general commands in any application.
• B) Graphical User Interface; it allows users to interact with electronic devices through
graphical icons.
• C) Guided User Interaction; it guides users through complex software setups.
• D) Global Unification Interface; it standardizes software interfaces globally.
• Correct Answer: B) Graphical User Interface; it allows users to interact with electronic
devices through graphical icons.

Lecture 3 Questions
Question 1: What is the primary role of an operating system (OS)?

• A) To manage the computer's hardware and software resources


• B) To create spreadsheets
• C) To design web pages
• D) To develop mobile apps
• Correct Answer: A) To manage the computer's hardware and software resources

Question 2: What does GUI stand for in computing?

• A) General User Interface


• B) Graphical User Interface
• C) Graphical Universal Interface
• D) General Universal Interface
• Correct Answer: B) Graphical User Interface

Question 3: Which operating system is designed specifically for Apple


computers?

• A) Windows
• B) Android
• C) macOS
• D) Linux
• Correct Answer: C) macOS

Question 4: What is multitasking in the context of operating systems?

• A) Performing a single task at a time


• B) Switching between different operating systems
• C) The ability to execute multiple tasks or programs simultaneously
• D) Increasing the computer's processing power
• Correct Answer: C) The ability to execute multiple tasks or programs simultaneously

Question 5: Which type of operating system is optimized for handling real-time


operations?

• A) General-Purpose Operating Systems


• B) Real-Time Operating Systems (RTOS)
• C) Mobile Operating Systems
• D) Desktop Operating Systems
• Correct Answer: B) Real-Time Operating Systems (RTOS)

Question 6: The process of starting or restarting a computer is known as:

• A) Rebooting
• B) Booting
• C) Initializing
• D) Waking up
• Correct Answer: B) Booting
Question 7: Which feature of an operating system provides a visual interface
with icons, windows, and menus?

• A) Command-Line Interface (CLI)


• B) Graphical User Interface (GUI)
• C) Desktop Environment
• D) Shell
• Correct Answer: B) Graphical User Interface (GUI)

Question 8: Linux is an example of what type of software?

• A) Proprietary software
• B) Open-source software
• C) Freeware
• D) Shareware
• Correct Answer: B) Open-source software

Question 9: In computing, what does CLI stand for?

• A) Command-Line Interface
• B) Common Language Interface
• C) Computer-Linked Interface
• D) Command-Linked Interface
• Correct Answer: A) Command-Line Interface

Question 10: Which operating system is primarily used on servers and


supercomputers?

• A) Windows 10
• B) macOS
• C) Linux
• D) iOS
• Correct Answer: C) Linux

Question 11: Which term describes the process of starting a computer that has
been turned off?

• A) Warm boot
• B) Cold boot
• C) Reboot
• D) Quick start
• Correct Answer: B) Cold boot

Question 12: What does "GUI" stand for in the context of operating systems?
• A) General User Interface
• B) Graphical User Interface
• C) Generic Utility Interface
• D) Guided User Interaction
• Correct Answer: B) Graphical User Interface

Question 13: Which of the following is a feature unique to server operating


systems?

• A) Multitasking
• B) Gesture Control
• C) Scalability and reliability
• D) Icons and pointers
• Correct Answer: C) Scalability and reliability

Question 14: What is the primary difference between desktop and mobile
operating systems?

• A) Desktop OSes cannot run applications


• B) Mobile OSes are only used for making phone calls
• C) Desktop OSes are designed for personal computers, while mobile OSes are for
smartphones and tablets
• D) There is no difference
• Correct Answer: C) Desktop OSes are designed for personal computers, while mobile
OSes are for smartphones and tablets

Question 15: Which operating system is known for its open-source nature?

• A) Windows
• B) macOS
• C) Linux
• D) iOS
• Correct Answer: C) Linux

Question 16: What does the term "booting" refer to in the context of operating
systems?

• A) Deleting files from the hard drive


• B) Starting or restarting the computer
• C) Connecting to the internet
• D) Updating the OS
• Correct Answer: B) Starting or restarting the computer

Question 17: What is the main function of utility programs in an operating


system?
• A) To play video games
• B) To manage system resources and perform maintenance tasks
• C) To create text documents
• D) To browse the internet
• Correct Answer: B) To manage system resources and perform maintenance tasks

Question 18: Which of the following is NOT a common feature of an operating


system?

• A) Menus
• B) Spell check
• C) Windows
• D) Icons
• Correct Answer: B) Spell check

Question 19: In which type of operating systems are Command-Line Interfaces


(CLI) commonly found?

• A) Mobile Operating Systems


• B) Desktop Operating Systems
• C) Server Operating Systems
• D) None of the above
• Correct Answer: C) Server Operating Systems

Question 20: Which operating system feature allows for the execution of multiple
applications at the same time?

• A) Booting
• B) Multitasking
• C) Gesture Control
• D) File Management
• Correct Answer: B) Multitasking

Lecture 4 Questions
Question 1: What are web bugs used for?

• A) To improve website performance


• B) To provide the creator with email addresses that can be sold
• C) To secure websites from hackers
• D) To enhance user experience with personalized content
• Correct Answer: B) To provide the creator with email addresses that can be sold
Question 2: Which program is designed to detect and remove privacy threats?

• A) Web browsers
• B) Office software
• C) Anti-Spyware programs
• D) Operating Systems
• Correct Answer: C) Anti-Spyware programs

Question 3: What is the most common type of phishing attack?

• A) Phishing emails
• B) Smishing
• C) Vishing
• D) Fishing
• Correct Answer: A) Phishing emails

Question 4: How can you protect yourself from ransomware attacks?

• A) Open all email attachments


• B) Pay the ransom
• C) Regular backups and verifying emails
• D) Use simple passwords
• Correct Answer: C) Regular backups and verifying emails

Question 5: Which of the following is NOT a suggested method to protect


yourself online?

• A) Using a Password manager


• B) Enable 2FA where possible
• C) Reuse passwords across accounts
• D) Change default passwords
• Correct Answer: C) Reuse passwords across accounts

Question 6: What is the purpose of a Firewall?

• A) To monitor internet usage


• B) To serve as a security buffer between networks
• C) To improve internet speed
• D) To block all incoming traffic
• Correct Answer: B) To serve as a security buffer between networks

Question 7: What action should you take if you receive a phishing email?

• A) Click all links to verify authenticity


• B) Forward the email to friends
• C) Report suspicious emails
• D) Respond with personal information to confirm your identity
• Correct Answer: C) Report suspicious emails

Question 8: Which attack intercepts and relays messages between two parties
without their knowledge?

• A) SQL Injection
• B) Man-in-the-middle Attack
• C) Cross-Site Scripting (XSS)
• D) Buffer Overflow
• Correct Answer: B) Man-in-the-middle Attack

Question 9: What is a Keylogger designed to do?

• A) Encrypt files until a ransom is paid


• B) Monitor and record keystrokes on a computer
• C) Spread viruses via email
• D) Block unauthorized access to websites
• Correct Answer: B) Monitor and record keystrokes on a computer

Question 10: What does the term "Malware" refer to?

• A) Software that improves computer performance


• B) Updates for computer security
• C) Malicious software designed to damage or disrupt systems
• D) A type of firewall
• Correct Answer: C) Malicious software designed to damage or disrupt systems

Question 11: What is the primary objective of social engineering attacks?

• A) To physically damage computer components


• B) To exploit technical vulnerabilities in software
• C) To manipulate individuals into divulging confidential information
• D) To enhance network security through simulations
• Correct Answer: C) To manipulate individuals into divulging confidential information

Question 12: Which term refers to software that hides its presence while
providing unauthorized access to a computer?

• A) Adware
• B) Rootkit
• C) Ransomware
• D) Firewall
• Correct Answer: B) Rootkit
Question 13: What does a Buffer Overflow attack exploit?

• A) The physical damage of a storage device


• B) The limitations in web browser security
• C) The inadequate handling of data by a program
• D) The strength of passwords
• Correct Answer: C) The inadequate handling of data by a program

Question 14: What action can help protect against the exploitation of unpatched
software vulnerabilities?

• A) Using complex passwords


• B) Regularly updating software and applying patches
• C) Avoiding the use of antivirus software
• D) Sharing passwords only over encrypted channels
• Correct Answer: B) Regularly updating software and applying patches

Question 15: Which of these is a common sign of a phishing email?

• A) High-quality graphics and logos


• B) Specific personal details about the recipient
• C) Urgent language pressuring immediate action
• D) Correct spelling and grammar throughout
• Correct Answer: C) Urgent language pressuring immediate action

Question 16: Why are strong, unique passwords important for online security?

• A) They ensure faster internet connectivity


• B) They make it difficult for unauthorized users to gain access
• C) They are required by law
• D) They prevent the installation of software updates
• Correct Answer: B) They make it difficult for unauthorized users to gain access

Question 17: What is the recommended response if you suspect a message is part
of a smishing attack?

• A) Reply to confirm your identity


• B) Click on links to check their validity
• C) Delete the message and report it if possible
• D) Share the message with friends for advice
• Correct Answer: C) Delete the message and report it if possible

Question 18: How does ransomware typically spread to infect computers?

• A) Through unsecured Wi-Fi networks


• B) Via email attachments and malicious links
• C) By physically accessing the computer
• D) Through automatic software updates
• Correct Answer: B) Via email attachments and malicious links

Question 19: What is multi-factor authentication (MFA) designed to do?

• A) Slow down computer performance


• B) Increase the complexity of user interfaces
• C) Provide an additional layer of security beyond just a password
• D) Decrease security to make systems more user-friendly
• Correct Answer: C) Provide an additional layer of security beyond just a password

Question 20: What is the goal of a Denial of Service (DoS) attack?

• A) To steal sensitive information from a network


• B) To improve system performance by clearing traffic
• C) To prevent legitimate users from accessing a service
• D) To secure networks by testing their limits
• Correct Answer: C) To prevent legitimate users from accessing a service

Question 21: What does "Smishing" involve?

• A) Sending malicious software via email


• B) Intercepting data over unsecured Wi-Fi
• C) Sending deceptive messages via text
• D) Installing harmful software through external devices
• Correct Answer: C) Sending deceptive messages via text

Question 22: How can organizations best protect themselves against ransomware
attacks?

• A) By frequently changing network passwords


• B) Regularly updating software and performing backups
• C) Limiting internet access
• D) Using a single antivirus software
• Correct Answer: B) Regularly updating software and performing backups

Question 23: Which of these is an example of social engineering?

• A) SQL Injection
• B) Buffer Overflow
• C) Phishing
• D) Cross-Site Scripting (XSS)
• Correct Answer: C) Phishing
Question 24: True or False: A backdoor in a computer system allows for
bypassing normal authentication processes.

• Correct Answer: True

Question 25: Which type of attack involves exploiting a vulnerability before it's
known to the vendor?

• A) Denial of Service
• B) Man-in-the-middle
• C) Zero-day exploit
• D) Advanced Persistent Threat
• Correct Answer: C) Zero-day exploit

Question 26: What is the primary function of spyware?

• A) To improve computer performance


• B) To monitor and report a user's activities
• C) To encrypt data for security
• D) To filter spam emails
• Correct Answer: B) To monitor and report a user's activities

Question 27: A program that appears legitimate but performs malicious


activities is known as:

• A) Virus
• B) Worm
• C) Trojan Horse
• D) Ransomware
• Correct Answer: C) Trojan Horse

Question 28: Which method is NOT a way to perform and automate important
security tasks?

• A) Security Suites
• B) Password Managers
• C) Manual software updates
• D) Firewalls
• Correct Answer: C) Manual software updates

Question 29: What does "Buffer Overflow" refer to?

• A) A method of bypassing firewall protections


• B) An exploit that takes advantage of a program waiting for a user's input
• C) Overloading a website with traffic to crash it
• D) Sending too many print jobs to a network printer
• Correct Answer: B) An exploit that takes advantage of a program waiting for a user's
input

Question 30: True or False: Anti-Spyware programs are designed to detect web
bugs and monitoring software.

• Correct Answer: True

Lecture 5 Questions
Question 1: What is the primary use of Microsoft Word?

• A) Spreadsheet calculations
• B) Database management
• C) Word processing
• D) Presentation design
• Correct Answer: C) Word processing

Question 2: Where can you find the minimize, maximize/restore, and close
buttons in Microsoft Word?

• A) Status bar
• B) Ribbon
• C) Title bar
• D) Quick Access Toolbar
• Correct Answer: C) Title bar

Question 3: What does the Quick Access Toolbar in Microsoft Word contain by
default?

• A) Clipboard, Font, and Paragraph Groups


• B) Save, Undo, and Repeat commands
• C) File, Home, and Insert Tabs
• D) Themes, Page Setup, and Page Background Groups
• Correct Answer: B) Save, Undo, and Repeat commands

Question 4: Which interface is used by Microsoft Office 2007 & 2010?

• A) Menu Bar
• B) Toolbars
• C) Ribbon
• D) Status Bar
• Correct Answer: C) Ribbon

Question 5: The 'File Tab' menu contains commands most commonly associated
with what?

• A) Text formatting
• B) The file
• C) Adding elements to the document
• D) Reviewing the document
• Correct Answer: B) The file

Question 6: What kind of documents do files created in Microsoft Word often


referred to as?

• A) Spreadsheets
• B) Presentations
• C) Databases
• D) Documents
• Correct Answer: D) Documents

Question 7: In Microsoft Word, what happens when you click the minimize
button?

• A) The document is saved


• B) The document is closed
• C) The program becomes a button on the Windows taskbar
• D) The document is printed
• Correct Answer: C) The program becomes a button on the Windows taskbar

Question 8: How can you restore a minimized document to its original shape and
size in Microsoft Word?

• A) By double-clicking the title bar


• B) By clicking on the button on the taskbar
• C) By pressing Alt + Tab
• D) By right-clicking and selecting "Restore"
• Correct Answer: B) By clicking on the button on the taskbar

Question 9: What file extensions are typically associated with Microsoft Word
documents?

• A) .xls or .xlsx
• B) .ppt or .pptx
• C) .doc or .docx
• D) .mdb
• Correct Answer: C) .doc or .docx

Question 10: How can you customize the Ribbon in Microsoft Word?

• A) By selecting "Customize Ribbon" in Word Options


• B) By dragging and dropping tabs
• C) By right-clicking on the Ribbon or a group you want to customize
• D) By editing the default template
• Correct Answer: C) By right-clicking on the Ribbon or a group you want to customize

Question 11: What is the purpose of the 'Print Layout' view in Microsoft Word?

• A) To format text
• B) To design web pages
• C) To visualize how a document will look when printed
• D) To simplify document sharing
• Correct Answer: C) To visualize how a document will look when printed

Question 12: Which view in Microsoft Word displays the document as a


webpage?

• A) Web Layout
• B) Draft
• C) Outline
• D) Read Mode
• Correct Answer: A) Web Layout

Question 13: How can you save a Microsoft Word document as a PDF?

• A) File > Print > Save as PDF


• B) File > Save As > Choose PDF from the file type options
• C) File > Export > Create PDF/XPS
• D) File > Options > Convert to PDF
• Correct Answer: C) File > Export > Create PDF/XPS

Question 14: Where is the Ruler located in the Microsoft Word document
window?

• A) Below the document


• B) To the left and top of the document
• C) On the Ribbon
• D) In the status bar
• Correct Answer: B) To the left and top of the document
Question 15: What function does the 'Page Break'
feature serve in Print Layout view?

• A) It changes the page orientation


• B) It adds a new page to the document
• C) It indicates where one page ends and another begins
• D) It adjusts the page margins
• Correct Answer: C) It indicates where one page ends and another begins

Question 16: How can you open an existing document in Microsoft Word?

• A) File > New > Open Existing Document


• B) File > Open > Browse
• C) File > Open > Recent Documents
• D) File > Open > Open New
• Correct Answer: B) File > Open > Browse

Question 17: In Microsoft Word, what does the 'Save As' function allow you to
do?

• A) Instantly save changes to the current document


• B) Save a copy of the document with a new name or in a new location
• C) Automatically save the document every minute
• D) Save the document as a template
• Correct Answer: B) Save a copy of the document with a new name or in a new location

Question 18: How do you select text in Microsoft Word?

• A) Double-click the word


• B) Drag the mouse across the text
• C) Right-click the text
• D) Click and hold the text
• Correct Answer: B) Drag the mouse across the text

Question 19: Which feature allows you to create a duplicate of the selected text in
Microsoft Word?

• A) Cut and Paste


• B) Copy and Paste
• C) Drag and Drop
• D) Move and Merge
• Correct Answer: B) Copy and Paste

21
Question 20: What is the primary function of the 'Undo'
command in Microsoft Word's Quick Access Toolbar?

• A) To repeat the last action


• B) To save the document
• C) To reverse the last action
• D) To delete the selected text
• Correct Answer: C) To reverse the last action

Question 21: How can you adjust the margins of a document in Microsoft Word?

• A) File > Page Setup > Margins


• B) Layout > Margins > Custom Margins
• C) View > Show > Margins
• D) Insert > Page Numbers > Margins
• Correct Answer: B) Layout > Margins > Custom Margins

Question 22: Which of the following is NOT a tab found in the Microsoft Word
Ribbon?

• A) File
• B) Edit
• C) Review
• D) References
• Correct Answer: B) Edit

Question 23: In Microsoft Word, how do you insert a hyperlink into your
document?

• A) File > Options > Add Link


• B) Insert > Link
• C) References > Insert Citation > Add Link
• D) Review > Comments > New Hyperlink
• Correct Answer: B) Insert > Link

Question 24: Which feature in Word allows you to see how your document will
look on the web?

• A) Web Layout View


• B) Print Layout View
• C) Draft View
• D) Read Mode
• Correct Answer: A) Web Layout View

22
Question 25: How can you remove the background of an
image inserted into a Word document?

• A) Format > Remove Background


• B) Insert > Picture > Delete Background
• C) Design > Page Background > No Color
• D) References > Captions > Exclude Background
• Correct Answer: A) Format > Remove Background

Question 26: What is the shortcut key to save a document in Microsoft Word?

• A) Ctrl + S
• B) Ctrl + N
• C) Ctrl + C
• D) Ctrl + P
• Correct Answer: A) Ctrl + S

Question 27: Which function do you use to check the spelling and grammar in
your Word document?

• A) Review > Check


• B) Review > Spelling & Grammar
• C) File > Options > Proofing
• D) Layout > Check Document
• Correct Answer: B) Review > Spelling & Grammar

Question 28: How can you increase the indent of a paragraph in Microsoft
Word?

• A) Layout > Alignment > Increase Indent


• B) Home > Paragraph > Increase Indent
• C) Insert > Text Box > Indent
• D) References > Footnotes > Increase Indent
• Correct Answer: B) Home > Paragraph > Increase Indent

Question 29: Which tab in Microsoft Word would you use to insert a table into
your document?

• A) File
• B) Insert
• C) Layout
• D) References
• Correct Answer: B) Insert

23
Question 30: What is the purpose of the 'Track
Changes' feature in Microsoft Word?

• A) To highlight changes made by different users


• B) To automatically correct spelling mistakes
• C) To keep track of word count only
• D) To convert the document into a different format
• Correct Answer: A) To highlight changes made by different users

Question 31: How do you change the line spacing in a Word document?

• A) Home > Line and Paragraph Spacing


• B) Layout > Paragraph > Line Spacing
• C) Insert > Spacing > Line
• D) Design > Page Background > Spacing
• Correct Answer: A) Home > Line and Paragraph Spacing

Question 32: Which feature in Word helps you insert a pre-designed cover page
quickly?

• A) Insert > Quick Parts


• B) Design > Page Color
• C) Insert > Cover Page
• D) Layout > Themes
• Correct Answer: C) Insert > Cover Page

Question 33: How can you protect a document in Word from being edited?

• A) File > Protect Document > Restrict Editing


• B) Review > Protect > Restrict Access
• C) View > Macros > Security
• D) Layout > Watermark > Secure
• Correct Answer: A) File > Protect Document > Restrict Editing

Question 34: What does the 'Format Painter' tool do in Word?

• A) Changes the document's formatting to a predefined theme


• B) Copies the format of one piece of text to another
• C) Paints the selected text with a chosen color
• D) Automatically formats the document based on content
• Correct Answer: B) Copies the format of one piece of text to another

Question 35: In Word, how can you add a caption to a figure or table?

24
• A) References > Insert Caption
• B) Insert > Text > Caption
• C) Layout > Caption
• D) Design > Add Caption
• Correct Answer: A) References > Insert Caption

Question 36: What is the shortcut for opening the 'Find' dialog box in Word?

• A) Ctrl + F
• B) Ctrl + H
• C) Ctrl + G
• D) Ctrl + B
• Correct Answer: A) Ctrl + F

Question 37: How do you insert a footnote in a Word document?

• A) References > Insert Footnote


• B) Layout > Footnote
• C) Insert > Text Box > Footnote
• D) Review > Language > Footnote
• Correct Answer: A) References > Insert Footnote

Question 38: Which of the following options allows you to change the theme of
your document in Word?

• A) File > Options > General > Theme


• B) Design > Themes
• C) Layout > Page Setup > Theme
• D) View > Themes
• Correct Answer: B) Design > Themes

Question 39: How can you view the word count of your document in Word?

• A) Review > Word Count


• B) Layout > Word Count
• C) References > Show Word Count
• D) Review > Proofing > Word Count
• Correct Answer: A) Review > Word Count

Question 40: What is the purpose of the 'Mail Merge' feature in Word?

• A) To send the same document to multiple email addresses


• B) To merge multiple documents into one
• C) To create personalized documents for mass mailing from a template
• D) To check email compatibility of a Word document

25
• Correct Answer: C) To create personalized documents for
mass mailing from a template

26
27

You might also like