CS101 Practice Questions 2025
CS101 Practice Questions 2025
13. Software programs developed for performing particular tasks to related managing
computer resources is called_______
14. Which application software can you use to create, edit, and print documents?
16. The arithmetic and logic unit is the part of the CPU responsible for mathematical
function only. TRUE/FALSE
17. UNIX and MSDOS are examples of________
18. _________describes a self-replicating malware that spreads by duplicating itself in
order to infect other devices without user interaction
19. __________ is a malicious program, appearing to be legitimate, is commonly used to
target banking and payment systems to access confidential information
20. In MS Excel, the Greater Than sign (>) exemplifies a _____ operator.
21. ________is the default file type(extension) for presentation created using MS
PowerPoint 2007 or newer versions
22. In MS PowerPoint, the key used to run Slide Show from the beginning is ______
23. The intersection between a row and a column in spreadsheets is known as a____
24. What is the purpose of the Paste Special option ‘Keep Text Only’ in
MS Word?
25. In MS Word, the word document orientation is set __________ by default.
26. _______is the shortcut combination key to open a new blank page in MS Word.
27. Ctrl + E is a shortcut combination key used to ‘align center’ the selected text in MS
Word
28. In MS Word, if you want to display the meaning of a word in your text at the bottom
of the page, the________ feature will help you
29. Write the full meaning of the following abbreviations:
i. WLAN
ii. VPN
iii. DNS [3]
34. In a Word document, what is the feature that breaks line between long words and
move to the next line when possible?
35. Collecting data and converting it into another form is called _______
36. What is the name given to the computer's short-term memory that is lost when the
computer is turned off?
37. Redo function in MS Word reverses the previously performed action.
TRUE/FALSE
75.Give three online security measures individuals can take to protect their personal
information while using the internet.
75. Explain the following network topologies:
i. Start topology.
ii. Mesh topology.