Professional Documents
Culture Documents
ii. The function which is used to re-arrange data according to specific criteria is called:
(a) Filtering (b) Sorting
(c) Organizing (d) Grouping
iii. If we want to change the overall design of a word document, we should use:
(a) Themes (b) Page layout
(c) Watermark (d) Margins
v. The operating system that allows frequent switching from one task to another is:
(a) Batch Processing (b) Real Time Processing
(c) Single User (d) Time Sharing
viii. The broad term that encompasses different harmful software is:
(a) Virus (b) Malware
(c) Adware (d) Spyware
ix. The malware that replicates itself and doesn't need to attach with any files is:
(a) Virus (b) Adware
(c) Spyware (d) Worm
xviii. The special character that initiates the formula mode in a cell is:
(a) / (b) =
(c) - (d) *
xxii. Since it does not harm or steal data, the least harmful malware is:
(a) Virus (b) Adware
(c) Spyware (d) Trojan
xxiii. The service that is responsible for making websites publicly accessible through the internet is:
(a) Web Server (b) Web Hosting
(c) Web Site (d) Web Browser
xxiv. To differentiate the heading cells from rest of the data in a table, we use:
(a) <th> tag (b) <tr> tag
(c) <td> tag (d) <dt> tag
Section – B (Short Answer Questions)
Note: Attempt any eight questions from this Section. All question carry equal marks. 24