Practice Questions
Lecture 1 Questions
Question 1: What is the primary purpose of an operating system in a computer?
• A) To provide games for entertainment
• B) To manage the computer's hardware and software resources
• C) To facilitate internet browsing only
• D) To charge the computer's battery
• Correct Answer: B) To manage the computer's hardware and software resources
Question 2: Which of the following is considered the "brain" of the computer?
• A) The keyboard
• B) The monitor
• C) The microprocessor
• D) The mouse
• Correct Answer: C) The microprocessor
Question 3: What is the role of application software on a computer?
• A) To cool down the hardware components
• B) To perform specific user-oriented tasks
• C) To clean the computer's screen
• D) To increase the weight of the computer
• Correct Answer: B) To perform specific user-oriented tasks
Question 4: Which type of memory loses its content when the power is turned
off?
• A) Hard Disk
• B) Solid-State Drive (SSD)
• C) Read-Only Memory (ROM)
• D) Random Access Memory (RAM)
• Correct Answer: D) Random Access Memory (RAM)
Question 5: Input devices translate data into a form that is understandable by
the computer. Which of the following is an input device?
• A) Printer
• B) Speaker
• C) Keyboard
• D) Monitor
• Correct Answer: C) Keyboard
Question 6: Secondary storage is essential for holding data long-term. Which of
these is a form of secondary storage?
• A) RAM
• B) The CPU
• C) Hard disk
• D) The motherboard
• Correct Answer: C) Hard disk
Question 7: What is a utility program?
• A) A type of game software
• B) Software that performs computer maintenance tasks
• C) A program that increases the computer's processing speed
• D) A social media application
• Correct Answer: B) Software that performs computer maintenance tasks
Question 8: What does the term "embedded operating system" refer to?
• A) An operating system that is physically embedded into computer hardware
• B) An OS used primarily in embedded computer systems for specific tasks
• C) An OS that can only be used when connected to the internet
• D) An OS designed exclusively for desktop computers
• Correct Answer: B) An OS used primarily in embedded computer systems for specific
tasks
Question 9: What device driver's primary function?
• A) To increase the volume of the speakers
• B) To enable the operating system to communicate with hardware devices
• C) To protect the computer from viruses
• D) To drive the computer's fan
• Correct Answer: B) To enable the operating system to communicate with hardware
devices
Question 10: Which of the following best defines software?
• A) Physical parts that you can touch and see
• B) Instructions or programs that tell the computer what to do
• C) A tool used for opening the computer case
• D) The manual that comes with the computer
• Correct Answer: B) Instructions or programs that tell the computer what to do
Question 11: What is the primary function of the World Wide Web?
• A) To provide a platform for email communication
• B) To enable the sharing of information through documents linked by hyperlinks
• C) To facilitate peer-to-peer file sharing
• D) To secure private networks over the Internet
• Correct Answer: B) To enable the sharing of information through documents linked by
hyperlinks
Question 12: What technology is essential for connecting different devices over
the Internet?
• A) USB cables
• B) Bluetooth
• C) Network Protocols
• D) HDMI
• Correct Answer: C) Network Protocols
Question 13: What represents a significant impact of cloud computing?
• A) Reduced need for physical storage devices
• B) Increased requirement for on-premise data centers
• C) Decreased internet usage
• D) The decline of mobile devices
• Correct Answer: A) Reduced need for physical storage devices
Question 14: Which device is NOT considered part of the Internet of Things
(IoT)?
• A) A smart refrigerator
• B) A desktop calculator
• C) A fitness tracker
• D) An autonomous vehicle
• Correct Answer: B) A desktop calculator
Question 15: Who typically assumes the role of developing and maintaining
websites and web resources?
• A) Network Administrator
• B) Software Engineer
• C) Webmaster
• D) Technical Writer
• Correct Answer: C) Webmaster
Question 16: What project is credited with laying the foundational work for the
Internet in 1969?
• A) Microsoft Windows
• B) The World Wide Web Consortium (W3C)
• C) ARPANET
• D) IBM PC Development
• Correct Answer: C) ARPANET
Question 17: Which device is a primary tool for accessing Internet resources?
• A) Calculator
• B) Browser
• C) Printer
• D) Fax Machine
• Correct Answer: B) Browser
Question 18: What is NOT a common type of file found on the Web?
• A) Document File
• B) Worksheet File
• C) Database File
• D) Hardware File
• Correct Answer: D) Hardware File
Question 19: What concept involves the sharing of information via a network like
the Internet?
• A) Connectivity
• B) Isolation
• C) Segmentation
• D) Centralization
• Correct Answer: A) Connectivity
Question 20: Which of the following is not a force of technology mentioned in the
presentation?
• A) Cloud Computing
• B) Wireless Technology
• C) Print Media
• D) Internet of Things (IoT)
• Correct Answer: C) Print Media
Lecture 2 Questions
Question 1: What is the primary function of connectivity in terms of computing?
• A) Enhancing the physical appearance of devices
• B) Sharing of information via a communications system
• C) Increasing the processing speed of computers
• D) Improving the battery life of mobile devices
• Correct Answer: B) Sharing of information via a communications system
Question 2: Which of the following is considered the largest network?
• A) A corporate intranet
• B) A home Wi-Fi network
• C) The Internet
• D) A school's computer lab network
• Correct Answer: C) The Internet
Question 3: What has cloud computing enabled users to access more of?
• A) Physical computers
• B) Internet resources
• C) Paper documents
• D) Local storage devices
• Correct Answer: B) Internet resources
Question 4: Wireless technology has significantly changed the way we:
• A) Perform physical exercises
• B) Communicate
• C) Cook food
• D) Travel
• Correct Answer: B) Communicate
Question 5: The Internet of Things (IoT) allows which of the following to
communicate?
• A) Only computers and smartphones
• B) All types of devices
• C) Only kitchen appliances
• D) Only wearable devices
• Correct Answer: B) All types of devices
Question 6: What is the role of a Webmaster?
• A) Repairs computer components
• B) Prepares food in a cafeteria
• C) Develops and maintains websites
• D) Drives a school bus
• Correct Answer: C) Develops and maintains websites
Question 7: Which project initiated the development of a national computer
network in the United States in 1969?
• A) World Wide Web
• B) Google
• C) ARPANET
• D) Microsoft
• Correct Answer: C) ARPANET
Question 8: What does a browser provide access to?
• A) Only email services
• B) Web resources
• C) Local files on a computer
• D) Printers and scanners
• Correct Answer: B) Web resources
Question 9: The part of a URL that specifies the location or address of a resource
is known as the:
• A) Protocol
• B) Domain name
• C) Browser
• D) Operating system
• Correct Answer: B) Domain name
Question 10: Which type of email system requires installation on a computer?
• A) Web-based email
• B) Client-based email
• C) Cloud-based email
• D) Server-based email
• Correct Answer: B) Client-based email
Question 11: Which term describes the interconnected mesh of computers and
data lines known as the Internet?
• A) The Web
• B) The Cloud
• C) Network
• D) The Mesh
• Correct Answer: C) Network
Question 12: What year was the World Wide Web introduced?
• A) 1969
• B) 1985
• C) 1991
• D) 2000
• Correct Answer: C) 1991
Question 13: The Internet and the Web are:
• A) Exactly the same.
• B) Completely unrelated.
• C) Different, where the Internet is a physical network and the Web is a service on it.
• D) Two competing technologies developed by different countries.
• Correct Answer: C) Different, where the Internet is a physical network and the Web is a
service on it.
Question 14: What is the primary protocol used for web traffic?
• A) FTP
• B) HTTP
• C) SMTP
• D) HTTPS
• Correct Answer: D) HTTPS
Question 15: A ".gov" top-level domain (TLD) indicates a website is associated
with:
• A) Commercial entities.
• B) Educational institutions.
• C) Government entities.
• D) Network services.
• Correct Answer: C) Government entities.
Question 16: What distinguishes client-based email from web-based email?
• A) Client-based email can only send messages, while web-based can send and receive.
• B) Client-based email requires software installation on a computer.
• C) Web-based email cannot handle attachments.
• D) Client-based email is less secure than web-based email.
• Correct Answer: B) Client-based email requires software installation on a computer.
Question 17: What is SPAM primarily known as?
• A) A type of computer virus.
• B) Unsolicited or unwelcome email.
• C) A useful tool for email organization.
• D) An instant messaging service.
• Correct Answer: B) Unsolicited or unwelcome email.
Question 18: The CAN-SPAM Act is related to:
• A) Cyberbullying prevention.
• B) Email marketing regulations.
• C) Social media privacy.
• D) Online shopping security.
• Correct Answer: B) Email marketing regulations.
Question 19: Which application is NOT typically included in general purpose
applications?
• A) Database management systems
• B) Word processors
• C) Antivirus software
• D) Presentation programs
• Correct Answer: C) Antivirus software
Question 20: What does GUI stand for, and what does it allow users to do?
• A) General User Interface; it allows users to input general commands in any application.
• B) Graphical User Interface; it allows users to interact with electronic devices through
graphical icons.
• C) Guided User Interaction; it guides users through complex software setups.
• D) Global Unification Interface; it standardizes software interfaces globally.
• Correct Answer: B) Graphical User Interface; it allows users to interact with electronic
devices through graphical icons.
Lecture 3 Questions
Question 1: What is the primary role of an operating system (OS)?
• A) To manage the computer's hardware and software resources
• B) To create spreadsheets
• C) To design web pages
• D) To develop mobile apps
• Correct Answer: A) To manage the computer's hardware and software resources
Question 2: What does GUI stand for in computing?
• A) General User Interface
• B) Graphical User Interface
• C) Graphical Universal Interface
• D) General Universal Interface
• Correct Answer: B) Graphical User Interface
Question 3: Which operating system is designed specifically for Apple
computers?
• A) Windows
• B) Android
• C) macOS
• D) Linux
• Correct Answer: C) macOS
Question 4: What is multitasking in the context of operating systems?
• A) Performing a single task at a time
• B) Switching between different operating systems
• C) The ability to execute multiple tasks or programs simultaneously
• D) Increasing the computer's processing power
• Correct Answer: C) The ability to execute multiple tasks or programs simultaneously
Question 5: Which type of operating system is optimized for handling real-time
operations?
• A) General-Purpose Operating Systems
• B) Real-Time Operating Systems (RTOS)
• C) Mobile Operating Systems
• D) Desktop Operating Systems
• Correct Answer: B) Real-Time Operating Systems (RTOS)
Question 6: The process of starting or restarting a computer is known as:
• A) Rebooting
• B) Booting
• C) Initializing
• D) Waking up
• Correct Answer: B) Booting
Question 7: Which feature of an operating system provides a visual interface
with icons, windows, and menus?
• A) Command-Line Interface (CLI)
• B) Graphical User Interface (GUI)
• C) Desktop Environment
• D) Shell
• Correct Answer: B) Graphical User Interface (GUI)
Question 8: Linux is an example of what type of software?
• A) Proprietary software
• B) Open-source software
• C) Freeware
• D) Shareware
• Correct Answer: B) Open-source software
Question 9: In computing, what does CLI stand for?
• A) Command-Line Interface
• B) Common Language Interface
• C) Computer-Linked Interface
• D) Command-Linked Interface
• Correct Answer: A) Command-Line Interface
Question 10: Which operating system is primarily used on servers and
supercomputers?
• A) Windows 10
• B) macOS
• C) Linux
• D) iOS
• Correct Answer: C) Linux
Question 11: Which term describes the process of starting a computer that has
been turned off?
• A) Warm boot
• B) Cold boot
• C) Reboot
• D) Quick start
• Correct Answer: B) Cold boot
Question 12: What does "GUI" stand for in the context of operating systems?
• A) General User Interface
• B) Graphical User Interface
• C) Generic Utility Interface
• D) Guided User Interaction
• Correct Answer: B) Graphical User Interface
Question 13: Which of the following is a feature unique to server operating
systems?
• A) Multitasking
• B) Gesture Control
• C) Scalability and reliability
• D) Icons and pointers
• Correct Answer: C) Scalability and reliability
Question 14: What is the primary difference between desktop and mobile
operating systems?
• A) Desktop OSes cannot run applications
• B) Mobile OSes are only used for making phone calls
• C) Desktop OSes are designed for personal computers, while mobile OSes are for
smartphones and tablets
• D) There is no difference
• Correct Answer: C) Desktop OSes are designed for personal computers, while mobile
OSes are for smartphones and tablets
Question 15: Which operating system is known for its open-source nature?
• A) Windows
• B) macOS
• C) Linux
• D) iOS
• Correct Answer: C) Linux
Question 16: What does the term "booting" refer to in the context of operating
systems?
• A) Deleting files from the hard drive
• B) Starting or restarting the computer
• C) Connecting to the internet
• D) Updating the OS
• Correct Answer: B) Starting or restarting the computer
Question 17: What is the main function of utility programs in an operating
system?
• A) To play video games
• B) To manage system resources and perform maintenance tasks
• C) To create text documents
• D) To browse the internet
• Correct Answer: B) To manage system resources and perform maintenance tasks
Question 18: Which of the following is NOT a common feature of an operating
system?
• A) Menus
• B) Spell check
• C) Windows
• D) Icons
• Correct Answer: B) Spell check
Question 19: In which type of operating systems are Command-Line Interfaces
(CLI) commonly found?
• A) Mobile Operating Systems
• B) Desktop Operating Systems
• C) Server Operating Systems
• D) None of the above
• Correct Answer: C) Server Operating Systems
Question 20: Which operating system feature allows for the execution of multiple
applications at the same time?
• A) Booting
• B) Multitasking
• C) Gesture Control
• D) File Management
• Correct Answer: B) Multitasking
Lecture 4 Questions
Question 1: What are web bugs used for?
• A) To improve website performance
• B) To provide the creator with email addresses that can be sold
• C) To secure websites from hackers
• D) To enhance user experience with personalized content
• Correct Answer: B) To provide the creator with email addresses that can be sold
Question 2: Which program is designed to detect and remove privacy threats?
• A) Web browsers
• B) Office software
• C) Anti-Spyware programs
• D) Operating Systems
• Correct Answer: C) Anti-Spyware programs
Question 3: What is the most common type of phishing attack?
• A) Phishing emails
• B) Smishing
• C) Vishing
• D) Fishing
• Correct Answer: A) Phishing emails
Question 4: How can you protect yourself from ransomware attacks?
• A) Open all email attachments
• B) Pay the ransom
• C) Regular backups and verifying emails
• D) Use simple passwords
• Correct Answer: C) Regular backups and verifying emails
Question 5: Which of the following is NOT a suggested method to protect
yourself online?
• A) Using a Password manager
• B) Enable 2FA where possible
• C) Reuse passwords across accounts
• D) Change default passwords
• Correct Answer: C) Reuse passwords across accounts
Question 6: What is the purpose of a Firewall?
• A) To monitor internet usage
• B) To serve as a security buffer between networks
• C) To improve internet speed
• D) To block all incoming traffic
• Correct Answer: B) To serve as a security buffer between networks
Question 7: What action should you take if you receive a phishing email?
• A) Click all links to verify authenticity
• B) Forward the email to friends
• C) Report suspicious emails
• D) Respond with personal information to confirm your identity
• Correct Answer: C) Report suspicious emails
Question 8: Which attack intercepts and relays messages between two parties
without their knowledge?
• A) SQL Injection
• B) Man-in-the-middle Attack
• C) Cross-Site Scripting (XSS)
• D) Buffer Overflow
• Correct Answer: B) Man-in-the-middle Attack
Question 9: What is a Keylogger designed to do?
• A) Encrypt files until a ransom is paid
• B) Monitor and record keystrokes on a computer
• C) Spread viruses via email
• D) Block unauthorized access to websites
• Correct Answer: B) Monitor and record keystrokes on a computer
Question 10: What does the term "Malware" refer to?
• A) Software that improves computer performance
• B) Updates for computer security
• C) Malicious software designed to damage or disrupt systems
• D) A type of firewall
• Correct Answer: C) Malicious software designed to damage or disrupt systems
Question 11: What is the primary objective of social engineering attacks?
• A) To physically damage computer components
• B) To exploit technical vulnerabilities in software
• C) To manipulate individuals into divulging confidential information
• D) To enhance network security through simulations
• Correct Answer: C) To manipulate individuals into divulging confidential information
Question 12: Which term refers to software that hides its presence while
providing unauthorized access to a computer?
• A) Adware
• B) Rootkit
• C) Ransomware
• D) Firewall
• Correct Answer: B) Rootkit
Question 13: What does a Buffer Overflow attack exploit?
• A) The physical damage of a storage device
• B) The limitations in web browser security
• C) The inadequate handling of data by a program
• D) The strength of passwords
• Correct Answer: C) The inadequate handling of data by a program
Question 14: What action can help protect against the exploitation of unpatched
software vulnerabilities?
• A) Using complex passwords
• B) Regularly updating software and applying patches
• C) Avoiding the use of antivirus software
• D) Sharing passwords only over encrypted channels
• Correct Answer: B) Regularly updating software and applying patches
Question 15: Which of these is a common sign of a phishing email?
• A) High-quality graphics and logos
• B) Specific personal details about the recipient
• C) Urgent language pressuring immediate action
• D) Correct spelling and grammar throughout
• Correct Answer: C) Urgent language pressuring immediate action
Question 16: Why are strong, unique passwords important for online security?
• A) They ensure faster internet connectivity
• B) They make it difficult for unauthorized users to gain access
• C) They are required by law
• D) They prevent the installation of software updates
• Correct Answer: B) They make it difficult for unauthorized users to gain access
Question 17: What is the recommended response if you suspect a message is part
of a smishing attack?
• A) Reply to confirm your identity
• B) Click on links to check their validity
• C) Delete the message and report it if possible
• D) Share the message with friends for advice
• Correct Answer: C) Delete the message and report it if possible
Question 18: How does ransomware typically spread to infect computers?
• A) Through unsecured Wi-Fi networks
• B) Via email attachments and malicious links
• C) By physically accessing the computer
• D) Through automatic software updates
• Correct Answer: B) Via email attachments and malicious links
Question 19: What is multi-factor authentication (MFA) designed to do?
• A) Slow down computer performance
• B) Increase the complexity of user interfaces
• C) Provide an additional layer of security beyond just a password
• D) Decrease security to make systems more user-friendly
• Correct Answer: C) Provide an additional layer of security beyond just a password
Question 20: What is the goal of a Denial of Service (DoS) attack?
• A) To steal sensitive information from a network
• B) To improve system performance by clearing traffic
• C) To prevent legitimate users from accessing a service
• D) To secure networks by testing their limits
• Correct Answer: C) To prevent legitimate users from accessing a service
Question 21: What does "Smishing" involve?
• A) Sending malicious software via email
• B) Intercepting data over unsecured Wi-Fi
• C) Sending deceptive messages via text
• D) Installing harmful software through external devices
• Correct Answer: C) Sending deceptive messages via text
Question 22: How can organizations best protect themselves against ransomware
attacks?
• A) By frequently changing network passwords
• B) Regularly updating software and performing backups
• C) Limiting internet access
• D) Using a single antivirus software
• Correct Answer: B) Regularly updating software and performing backups
Question 23: Which of these is an example of social engineering?
• A) SQL Injection
• B) Buffer Overflow
• C) Phishing
• D) Cross-Site Scripting (XSS)
• Correct Answer: C) Phishing
Question 24: True or False: A backdoor in a computer system allows for
bypassing normal authentication processes.
• Correct Answer: True
Question 25: Which type of attack involves exploiting a vulnerability before it's
known to the vendor?
• A) Denial of Service
• B) Man-in-the-middle
• C) Zero-day exploit
• D) Advanced Persistent Threat
• Correct Answer: C) Zero-day exploit
Question 26: What is the primary function of spyware?
• A) To improve computer performance
• B) To monitor and report a user's activities
• C) To encrypt data for security
• D) To filter spam emails
• Correct Answer: B) To monitor and report a user's activities
Question 27: A program that appears legitimate but performs malicious
activities is known as:
• A) Virus
• B) Worm
• C) Trojan Horse
• D) Ransomware
• Correct Answer: C) Trojan Horse
Question 28: Which method is NOT a way to perform and automate important
security tasks?
• A) Security Suites
• B) Password Managers
• C) Manual software updates
• D) Firewalls
• Correct Answer: C) Manual software updates
Question 29: What does "Buffer Overflow" refer to?
• A) A method of bypassing firewall protections
• B) An exploit that takes advantage of a program waiting for a user's input
• C) Overloading a website with traffic to crash it
• D) Sending too many print jobs to a network printer
• Correct Answer: B) An exploit that takes advantage of a program waiting for a user's
input
Question 30: True or False: Anti-Spyware programs are designed to detect web
bugs and monitoring software.
• Correct Answer: True
Lecture 5 Questions
Question 1: What is the primary use of Microsoft Word?
• A) Spreadsheet calculations
• B) Database management
• C) Word processing
• D) Presentation design
• Correct Answer: C) Word processing
Question 2: Where can you find the minimize, maximize/restore, and close
buttons in Microsoft Word?
• A) Status bar
• B) Ribbon
• C) Title bar
• D) Quick Access Toolbar
• Correct Answer: C) Title bar
Question 3: What does the Quick Access Toolbar in Microsoft Word contain by
default?
• A) Clipboard, Font, and Paragraph Groups
• B) Save, Undo, and Repeat commands
• C) File, Home, and Insert Tabs
• D) Themes, Page Setup, and Page Background Groups
• Correct Answer: B) Save, Undo, and Repeat commands
Question 4: Which interface is used by Microsoft Office 2007 & 2010?
• A) Menu Bar
• B) Toolbars
• C) Ribbon
• D) Status Bar
• Correct Answer: C) Ribbon
Question 5: The 'File Tab' menu contains commands most commonly associated
with what?
• A) Text formatting
• B) The file
• C) Adding elements to the document
• D) Reviewing the document
• Correct Answer: B) The file
Question 6: What kind of documents do files created in Microsoft Word often
referred to as?
• A) Spreadsheets
• B) Presentations
• C) Databases
• D) Documents
• Correct Answer: D) Documents
Question 7: In Microsoft Word, what happens when you click the minimize
button?
• A) The document is saved
• B) The document is closed
• C) The program becomes a button on the Windows taskbar
• D) The document is printed
• Correct Answer: C) The program becomes a button on the Windows taskbar
Question 8: How can you restore a minimized document to its original shape and
size in Microsoft Word?
• A) By double-clicking the title bar
• B) By clicking on the button on the taskbar
• C) By pressing Alt + Tab
• D) By right-clicking and selecting "Restore"
• Correct Answer: B) By clicking on the button on the taskbar
Question 9: What file extensions are typically associated with Microsoft Word
documents?
• A) .xls or .xlsx
• B) .ppt or .pptx
• C) .doc or .docx
• D) .mdb
• Correct Answer: C) .doc or .docx
Question 10: How can you customize the Ribbon in Microsoft Word?
• A) By selecting "Customize Ribbon" in Word Options
• B) By dragging and dropping tabs
• C) By right-clicking on the Ribbon or a group you want to customize
• D) By editing the default template
• Correct Answer: C) By right-clicking on the Ribbon or a group you want to customize
Question 11: What is the purpose of the 'Print Layout' view in Microsoft Word?
• A) To format text
• B) To design web pages
• C) To visualize how a document will look when printed
• D) To simplify document sharing
• Correct Answer: C) To visualize how a document will look when printed
Question 12: Which view in Microsoft Word displays the document as a
webpage?
• A) Web Layout
• B) Draft
• C) Outline
• D) Read Mode
• Correct Answer: A) Web Layout
Question 13: How can you save a Microsoft Word document as a PDF?
• A) File > Print > Save as PDF
• B) File > Save As > Choose PDF from the file type options
• C) File > Export > Create PDF/XPS
• D) File > Options > Convert to PDF
• Correct Answer: C) File > Export > Create PDF/XPS
Question 14: Where is the Ruler located in the Microsoft Word document
window?
• A) Below the document
• B) To the left and top of the document
• C) On the Ribbon
• D) In the status bar
• Correct Answer: B) To the left and top of the document
Question 15: What function does the 'Page Break'
feature serve in Print Layout view?
• A) It changes the page orientation
• B) It adds a new page to the document
• C) It indicates where one page ends and another begins
• D) It adjusts the page margins
• Correct Answer: C) It indicates where one page ends and another begins
Question 16: How can you open an existing document in Microsoft Word?
• A) File > New > Open Existing Document
• B) File > Open > Browse
• C) File > Open > Recent Documents
• D) File > Open > Open New
• Correct Answer: B) File > Open > Browse
Question 17: In Microsoft Word, what does the 'Save As' function allow you to
do?
• A) Instantly save changes to the current document
• B) Save a copy of the document with a new name or in a new location
• C) Automatically save the document every minute
• D) Save the document as a template
• Correct Answer: B) Save a copy of the document with a new name or in a new location
Question 18: How do you select text in Microsoft Word?
• A) Double-click the word
• B) Drag the mouse across the text
• C) Right-click the text
• D) Click and hold the text
• Correct Answer: B) Drag the mouse across the text
Question 19: Which feature allows you to create a duplicate of the selected text in
Microsoft Word?
• A) Cut and Paste
• B) Copy and Paste
• C) Drag and Drop
• D) Move and Merge
• Correct Answer: B) Copy and Paste
21
Question 20: What is the primary function of the 'Undo'
command in Microsoft Word's Quick Access Toolbar?
• A) To repeat the last action
• B) To save the document
• C) To reverse the last action
• D) To delete the selected text
• Correct Answer: C) To reverse the last action
Question 21: How can you adjust the margins of a document in Microsoft Word?
• A) File > Page Setup > Margins
• B) Layout > Margins > Custom Margins
• C) View > Show > Margins
• D) Insert > Page Numbers > Margins
• Correct Answer: B) Layout > Margins > Custom Margins
Question 22: Which of the following is NOT a tab found in the Microsoft Word
Ribbon?
• A) File
• B) Edit
• C) Review
• D) References
• Correct Answer: B) Edit
Question 23: In Microsoft Word, how do you insert a hyperlink into your
document?
• A) File > Options > Add Link
• B) Insert > Link
• C) References > Insert Citation > Add Link
• D) Review > Comments > New Hyperlink
• Correct Answer: B) Insert > Link
Question 24: Which feature in Word allows you to see how your document will
look on the web?
• A) Web Layout View
• B) Print Layout View
• C) Draft View
• D) Read Mode
• Correct Answer: A) Web Layout View
22
Question 25: How can you remove the background of an
image inserted into a Word document?
• A) Format > Remove Background
• B) Insert > Picture > Delete Background
• C) Design > Page Background > No Color
• D) References > Captions > Exclude Background
• Correct Answer: A) Format > Remove Background
Question 26: What is the shortcut key to save a document in Microsoft Word?
• A) Ctrl + S
• B) Ctrl + N
• C) Ctrl + C
• D) Ctrl + P
• Correct Answer: A) Ctrl + S
Question 27: Which function do you use to check the spelling and grammar in
your Word document?
• A) Review > Check
• B) Review > Spelling & Grammar
• C) File > Options > Proofing
• D) Layout > Check Document
• Correct Answer: B) Review > Spelling & Grammar
Question 28: How can you increase the indent of a paragraph in Microsoft
Word?
• A) Layout > Alignment > Increase Indent
• B) Home > Paragraph > Increase Indent
• C) Insert > Text Box > Indent
• D) References > Footnotes > Increase Indent
• Correct Answer: B) Home > Paragraph > Increase Indent
Question 29: Which tab in Microsoft Word would you use to insert a table into
your document?
• A) File
• B) Insert
• C) Layout
• D) References
• Correct Answer: B) Insert
23
Question 30: What is the purpose of the 'Track
Changes' feature in Microsoft Word?
• A) To highlight changes made by different users
• B) To automatically correct spelling mistakes
• C) To keep track of word count only
• D) To convert the document into a different format
• Correct Answer: A) To highlight changes made by different users
Question 31: How do you change the line spacing in a Word document?
• A) Home > Line and Paragraph Spacing
• B) Layout > Paragraph > Line Spacing
• C) Insert > Spacing > Line
• D) Design > Page Background > Spacing
• Correct Answer: A) Home > Line and Paragraph Spacing
Question 32: Which feature in Word helps you insert a pre-designed cover page
quickly?
• A) Insert > Quick Parts
• B) Design > Page Color
• C) Insert > Cover Page
• D) Layout > Themes
• Correct Answer: C) Insert > Cover Page
Question 33: How can you protect a document in Word from being edited?
• A) File > Protect Document > Restrict Editing
• B) Review > Protect > Restrict Access
• C) View > Macros > Security
• D) Layout > Watermark > Secure
• Correct Answer: A) File > Protect Document > Restrict Editing
Question 34: What does the 'Format Painter' tool do in Word?
• A) Changes the document's formatting to a predefined theme
• B) Copies the format of one piece of text to another
• C) Paints the selected text with a chosen color
• D) Automatically formats the document based on content
• Correct Answer: B) Copies the format of one piece of text to another
Question 35: In Word, how can you add a caption to a figure or table?
24
• A) References > Insert Caption
• B) Insert > Text > Caption
• C) Layout > Caption
• D) Design > Add Caption
• Correct Answer: A) References > Insert Caption
Question 36: What is the shortcut for opening the 'Find' dialog box in Word?
• A) Ctrl + F
• B) Ctrl + H
• C) Ctrl + G
• D) Ctrl + B
• Correct Answer: A) Ctrl + F
Question 37: How do you insert a footnote in a Word document?
• A) References > Insert Footnote
• B) Layout > Footnote
• C) Insert > Text Box > Footnote
• D) Review > Language > Footnote
• Correct Answer: A) References > Insert Footnote
Question 38: Which of the following options allows you to change the theme of
your document in Word?
• A) File > Options > General > Theme
• B) Design > Themes
• C) Layout > Page Setup > Theme
• D) View > Themes
• Correct Answer: B) Design > Themes
Question 39: How can you view the word count of your document in Word?
• A) Review > Word Count
• B) Layout > Word Count
• C) References > Show Word Count
• D) Review > Proofing > Word Count
• Correct Answer: A) Review > Word Count
Question 40: What is the purpose of the 'Mail Merge' feature in Word?
• A) To send the same document to multiple email addresses
• B) To merge multiple documents into one
• C) To create personalized documents for mass mailing from a template
• D) To check email compatibility of a Word document
25
• Correct Answer: C) To create personalized documents for
mass mailing from a template
26
27