0% found this document useful (0 votes)
28 views49 pages

CS101 Solved Quizzes File by Uzair Ali (Fall 2023)

CS101 Solved Quizzes File by Uzair Ali (Fall 2023)

Uploaded by

uzairmaan03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views49 pages

CS101 Solved Quizzes File by Uzair Ali (Fall 2023)

CS101 Solved Quizzes File by Uzair Ali (Fall 2023)

Uploaded by

uzairmaan03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

It Contains the Quiz no. 3 , Quiz no. 4 and Quiz no.

ͳͲͳ—‹œœ‡•
‘Ž—–‹‘ ‹Ž‡
For the Preparation of Final Term
Examinations

Prepared by: Uzair Ali


##########################################################
Quizzes_with_Right_Answers #Solved_Quizzes brought to You by Our
Whatsapp Group --------------------------------- Join Our Whatsapp Group
Now If you are in 1st Semester of BS (CS/SE/IT) Currently (Fall-2023)
and Send Your all attempted Quizzes Time by Time.
Join now: https://chat.whatsapp.com/KhcHoLdUjOyChPW15ASUt4

Fall 2023
ͳͲͳ—‹œ‘Ǥ͵Ȃ‘Ž—–‹‘ ‹Ž‡
(Solved 10 Quizzes -------CS101 Quiz No. 3 covers Lesson No. 82-125)

Why does the composition of loop control deserve attention?

Select the correct option

It is only relevant for simple algorithms.

It has no impact on the algorithm's performance.

It is typically error-free and does not require attention.

It is the more error-prone part of the structure.

The set of instructions in a computer language, to get the desired result is known as:

Select the correct option

A decision table

An algorithm

A pseudo code

A program

The language understood by a computer without translation is known as:

Select the correct option

Assembly language

Command Language

High Level Language

Machine Language
There are ..... iterations in following pseudo code.

def FindFactorial():

fact = 2

i=1;

While (i <= 7)

fact=fact*i;

i=i+1;

Select the correct option

Explanation: There are 7 iterations in the given pseudo code. This is evident from the code
itself, which uses a while loop to iterate through the values of variable i from 1 to 7.

What is the purpose of spam filters?

Select the correct option

To filter unwanted email

To act as an intermediary between client and server

To block outgoing messages

To learn the internal structure of an intranet


What property is crucial for pseudocode to serve its purpose in expressing algorithms?

Select the correct option

Aesthetic appeal

Complicated notation

Familiarity with programming languages

Consistent, concise notation for recurring semantic structures

What is the purpose of a firewall installed at the gateway of an organization's intranet?

Select the correct option

To establish contact through nonexistent servers

To collect information about internal structure

To act as an intermediary between client and server

To block incoming messages from known trouble sources

The binary search algorithm uses.......

Select the correct option

Divide and conquer method

Linear search

Quick sort technique

Bubble sort technique


What is the primary purpose of encryption in the context of data transfer over networks?

Select the correct option

To speed up data transfer

To hide data from users

To compress data

To ensure data confidentiality

What are the three activities involved in the control of a loop structure?

Select the correct option

Launch, Halt, Adjust

Initialize, Test, Modify

Begin, End, Continue

Start, Stop, Proceed

What term does computer science use for program units that can be used as abstract tools in
other applications?

Select the correct option

Script

Subprogram

Software part

Paragraph

By attaching the __________ to a message, the sender can mark the message as authentic.

Select the correct option

Dual Signature
Security

Protocol

Single Signature

In computer programming, what comes after the "if" keyword in an if-statement?

Select the correct option

Else

StatementB

Condition

StatementA

Which of the following is responsible for maintaining the anonymity of the actual client from
the server over the Internet?

Select the correct option

Routers

Proxy server

Spam Filters

Firewall

In the context of network security, what is the term used for pretending to be a party other
than oneself to gain an illegitimate advantage?

Select the correct option

Proxying

Masking

Spoofing
Masquerading

What is the ultimate goal when sorting a list within itself using the insertion sort algorithm?

Select the correct option

Shuffling entries

Clearing off space

Efficient use of storage space

Efficient use of time to sort a list in quick time

Which of the following symbol is used as assignment operator in Ada.

Select the correct option

:=

Which of the following symbol is used to represent Boolean operator for logical AND?

Select the correct option

!&

&

&&
What is the role of Phase 3 in the problem-solving process in the context of program
development?

Select the correct option

Evaluating the solution

Getting an idea of how an algorithmic function might solve the problem

Understanding the problem

Formulating the algorithm as a program

In Pakistan, what is the punishment for first-time offenders under the Cyber Security Law
passed in 2016?

Select the correct option

10 years

20 years

5 years

15 years

Which of the following might be used to convert high-level language instructions into
machine language?

Select the correct option

An interpreter

Operating environment

Framework

Applications software
A translator which takes assembly language program as input & produce machine language
code as output is known as:

Select the correct option

Assembler

Debugger

Interpreter

Compiler

In the case of highly standardized languages, compiler designers often provide features,
sometimes called

Select the correct option

Language symbols

Language code

Language translators

Language extension

The ________ in the state of the process must be sufficient to determine uniquely and
completely the actions required by each step.

Select the correct option

Program

Instructions

Data

Information
A private key is used to ________ messages.

Select the correct option

Encrypt

Decrypt

Send

Receive

In the algorithm of Sequential search, what indicates a successful search from the given
cases?

Select the correct option

List is empty

Equality of TargetValue and TestEntry

Target value is greater than TestEntry

Reaching the end of the list

What is the primary focus of pseudocode in the context of algorithm development?

Select the correct option

Algorithmic complexity

Intuitive notational systems

5ynton-semantic structures

Formal programming languages


What does the variable 'f' represent in the pseudo-code?

f=1

i=1;

While (i <= n):

f=f*i;

i=i+1;

Select the correct option

The loop counter

The initial value of the loop

The condition for loop termination

The factorial of the number

What is the purpose of the given pseudo-code?

f=1

i=1;

While (i <= n):

f=f*i;

i=i+1;

Select the correct option

To determine the maximum value in a list

To calculate the factorial of a given number

To identify prime numbers

To sort the number list


What is the role of the loop counter 'i' in the given pseudo-code?

f=1

i=1

While (i <= n):

f=f*i

i=i+1

Select the correct option

To reset the loop condition

To determine the initial value of "f'

To control the number of iterations in the loop

To compare with the value of 'n"

Explanation: In the given pseudo-code, the loop counter 'i' is used to control the number of
iterations in the loop. It is incremented in each iteration until it reaches the value of 'n'.

Always write a pseudo code in __________ manner.

Select the correct option

Independent

Dependent

Unambiguous

Ambiguous

Pseudo code is language ____________.

Select the correct option

Independent

Algorithm
Sequence

Dependent

What is the output of the following code?

int sum = 14;

if (sum < 20)

cout << "Under *;

if (sum >20)

cout << "Over *;

Select the correct option

Under the limit

Under

Over the limit

Over

What will be the output of the following statement?

int a = 10 + 4.867;

Select the correct option

14

10

14.867

Compiler error.
Select the first entry in List to be TestEntry.

while (TargetValue > TestEntry and there remain entries to be considered):

Select the next entry in List as TestEntry.

if (TargetValue == TestEntry):

Declare search a success.

else:

Declare search a failure.

Select the correct option

To terminate the search

To compare TestEntry with TargetValue

To iterate through the list entries

To sort the list

Float CGPA=2.5;

If (CGPA>=3.0)

Cout << "Give Scholarship";

Else

Cout << "Sorry you do not qualify for the scholarship";

It will show output

Select the correct option

Give Scholarship

Display none

Sorry you do not qualify for the scholarship


Good

Float CGPA=3.5;

If (CGPA>=3.0)

Cout << "Give Scholarship";

Else

Cout << "Sorry you do not qualify for the scholarship";

It will show output

Select the correct option

Give Scholarship

Good

Display none

Sorry you do not qualify for the scholarship

What technique is used by spam filters to distinguish between desirable email and spam?

Select the correct option

Learning through a training process

Firewalling

Spoofing

Proxying

Explanation: The technique used by spam filters to distinguish between desirable email and
spam is learning through a training process, where the filter is trained to recognize certain
characteristics or patterns in messages that are commonly associated with spam.
Post test loop structure refer to?

Select the correct option

Test for termination is performed before the body is executed

Test for termination is performed after the body is executed

Test for termination is performed with the body is executed

Test for termination is performed as well as the body is executed

Why is Phase 1 of problem-solving considered important in the problem-solving process?

Select the correct option

It helps gain a complete understanding of the problem.

It provides a systematic approach to problem-solving.

It directly leads to the formulation of the algorithm.

It precedes all other problem-solving phases.

Phase 1 of problem-solving steps is _____________.

Select the correct option

Evaluate the program for accuracy and for its potential as a tool for solving other problems

Formulate the algorithm and represent it as a program

Get an idea of how an algorithmic function might solve the problem.

Understand the problem.


What is the significance of the termination condition in the context of loop control?

Select the correct option

It prevents the loop from executing the body

It ensures the termination of the looping process

It has no impact on loop control

It ensures the loop body is executed indefinitely

In the provided pseudo-code, what is the role of the "Current" variable?

def FindMax():

max = first number in the list

Current = second number in the list

While (elements in the list exist)

If (maxcurrent)

max=current

Current = next value in the list

Select the correct option

It indicates the position of the current element in the list

It represents the minimum value in the list

It stores the current value being compared

It holds the maximum value in the list


How is the algorithm for converting temperature readings from Celsius to Fahrenheit
traditionally represented in the text?

Select the correct option

As a set of electronic instructions

As a physical circuit

As an algebraic formula

As a graphical representation

In the context of the insertion sort algorithm, what is the restriction imposed on sorting a
list?

Select the correct option

Make a tree of the list to sort entries

Insertion sort can only be used on the list containing numeric values

Sort using the same storage space without extra memory space

Create a copy of the list to sort items one by one into the new list

What is the ASCIl code for alphabet "A"?

Select the correct option

62

65

64

63

Explaination: $6&,OFRGHIRUDOSKDEHW$LVZKLOHIRU´DµLV
What is collectively called an assembly language in the context of programming?

Select the correct option

Compiler

Machine language

High-level language

Mnemonic system

In the context of the provided pseudocode, what is the purpose of the statement 'Count =
Count-1'?

def Greetings():

Count = 3

while (Count > 0):

print ('Hello')

Count = Count-1

Select the correct option

To reset the counter

To print a message

To increment the counter

To decrement the counter

Loop, is executed in a repetitive fashion under the direction of some

Select the correct option

Halting process

Sequence process

Control process
Under some background knowledge

What is the formal definition of an algorithm?

Select the correct option

An ordered set of unambiguous, executable steps

A sequence of parallel executable steps

A random set of steps

An ordered set of ambiguous steps

What does it mean for an algorithm to be "unambiguous," according to the formal definition
of computer algorithms?

Select the correct option

The steps have multiple interpretations.

The steps are clear and have a unique interpretation.

It can be executed by any computer.

It involves parallel processing.

Explanation: An algorithm is considered unambiguous if its steps are clear and have a unique
interpretation, meaning they do not have multiple interpretations.

What explains the role of the "Take a sip of tea" step in the context of the algorithm for
making a cup of tea and its ____________ impact on the overall process?

Select the correct option

It fetches a new cup.

It is irrelevant to the tea-making algorithm.

It concludes the algorithm.


It adds complexity to the algorithm.

Computer fraud and abuse act passed in

Select the correct option

1980

1990

1984

1983

Explaination: The Computer Fraud and Abuse Act (CFAA) was actually enacted in 1986 as an
amendment to existing computer fraud law.

Which one is a unary operator?

Select the correct option

OR

AND

EQUAL

NOT

Explanation: NOT is a unary operator. Unary operators are operators that operate on a single
operand or argument.

Which mathematician presented loosely defined problem-solving phases in 1945?

Select the correct option

G. Pollock

G. Polya

G. Palmer
G. Pascal

What is the role of "getting your foot in the door" in the problem-solving process?

Select the correct option

It guarantees a correct solution.

It opens the way to extending knowledge.

It provides a philosophical perspective.

It prevents direct confrontation.

Explanation: The role of "getting your foot in the door" in the problem-solving process is to
open the way to extending knowledge by providing a starting point or a first step towards
understanding the problem or finding a solution.

The description of the object's properties is called

Select the correct option

Class

Instance

Object

Function

What does the Prevention of Electronic Crimes Ordinance, 2007, in Pakistan aim to address?

Select the correct option

Cybersecurity education

Prevention of electronic crimes

International cooperation

Wiretapping regulation
Explanation: The Prevention of Electronic Crimes Ordinance, 2007, in Pakistan aims to address
the prevention of electronic crimes, which includes unauthorized access, system interference,
electronic fraud, forgery, and other related offenses.

Let a unsorted list Fred, Alex, Diana ,Byron,Carol

Which one will be sorted at last

Select the correct option

Fred

Diana

Alex

Carol

Explanation: If we use the bubble sort algorithm to sort the list Fred, Alex, Diana, Byron, Carol,
then Fred will be sorted at last.

The imperative paradigm, also known as the Particular machine

Select the correct option

Non traditional paradigms

Non-Procedural paradigms

Traditional paradigms

Procedural paradigms

What is the primary goal of the Sequential search algorithm?

Select the correct option

Detecting duplicate entries

Searching for a specific target value


Sorting a list

Randomizing list elements

How many times will the loop in the example below execute?

int counter=1;

while(counter <= 5)

cout << counter;

counter=counter+2;

Select the correct option

3 times

6 times

5 times

4 times

Explanation: The loop in the code snippet will execute 3 times. It will print the values 1, 3 and 5.

if (TargetValue == TestEntry):

In the above condition, what is " == "?

Select the correct option

Conditional loop

Expression

Assignment Operator

Equal to Operator
Why is the initialization step important in loop control?

Select the correct option

It ensures the termination of the looping process

It compares the current state to the termination condition

It establishes a starting condition that will be modified toward the termination condition

It executes the loop body

What is the purpose of the provided pseudocode?

def FindMax():

max = first number in the list

Current = second number in the list

While (elements in the list exist)

If (max<current)

max=current

Current = next value in the list

Select the correct option

Finding the average of a list

Finding the maximum number in a list

Counting the number of elements in a list

Sorting a list in ascending order


In the provided pseudo-code, what is the role of the "Current" variable?

def FindMax(:

max = first number in the list

Current = second number in the list

While (elements in the list exist)

If (max<current)

max=current

Current = next value in the list

Select the correct option

It indicates the position of the current element in the list

It holds the maximum value in the list

It stores the current value being compared

It represents the minimum value in the list

What is the main characteristic of public-key encryption systems?

Select the correct option

The use of any random key for encryption and the same key for decryption

The use of a single key for encryption and decryption

The use of two keys for encryption and decryption

Knowledge of encryption allows decryption


Third generation language attributes refer to

Select the correct option

Particular machine

None of these

For all machine (Machine Independence)

For only required machine

What is the purpose of an assignment statement in programming?

Select the correct option

To declare variables

To terminate the program

To request input from the user

To assign a value to a variable

A ------- alters the execution sequence of the program

Select the correct option

Assignment statement

Control statement

Division

Modulus

__________ is a package containing a party's name and that party's public key.

Select the correct option

Certificate

Security
Antivirus

Contract

What is a digital signature in the context of public-key encryption?

Select the correct option

A method to decrypt messages with private key

An authentic mark on the message produced with the private key

A certificate provided by a trusted authority

An encrypted message with public key

In the Java programming language, what is the equivalent term for an 'activation" in the
context of concurrent processing?

Select the correct option

Function

Operation

Thread

Task

In the declarative paradigm, what does a programmer focus on when presented with a
problem?

Select the correct option

Developing a precise statement of the problem

Finding a general-purpose algorithm

Describing detailed algorithms

Developing a sequence of commands


What would be the next statement?

Def findmax():

Max = first number in the list

Current = second number in the list

While (elements in the list exist)

Select the correct option

Current = next value in the list

Max=current

Max=value

If (max<current)

In the context of the provided pseudocode, what is the purpose of the statement "Count = 3?

def Greetings():

Count=3

While (Count > 0):

Print ('Hello')

Count= Count-1

Select the correct option

To define a loop condition

To request a service

To print a message

To initiate a counter
What does the modification step in loop control accomplish?

Select the correct option

Compares the current state to the termination condition

Establishes a starting condition

Terminates the loop

Moves the condition toward the termination condition

True parallel processing requires ------- CPU cores

Select the correct option

Single

None of these

Exact two cores

Multiple

Which organizations have adopted and published standards for popular programming
languages to address the lack of agreement on language definitions?

Select the correct option

Compiler Writers Association

Programming Language Alliance

International Compiler Consortium

American National Standards Institute (ANSI) and International Organization for


Standardization (ISO)
What might be true about the value of finding a related problem in problem-solving?

Select the correct option

It helps develop general algorithms.

It adds complexity to the current problem.

It is irrelevant to the problem-solving approach.

It complicates the solution process.

What condition triggers the termination of the sequential search algorithm as a failure on an
ordered list of names?

Select the correct option

List is empty

Equality of TargetValue and TestEntry

TestEntry is smaller than TargetValue

Reaching a name greater than the target name

Which of the following terms refers to the process in which a small request is initially made
and detailed solution is shared later?

Select the correct option

Low-balling

High-balling

Door-in-the-face technique

Foot-in-the-door technique
What is the formal definition of an algorithm?

Select the correct option

An ordered set of unambiguous, executable steps

A random set of steps

A sequence of parallel executable steps

An ordered set of ambiguous steps

In the context of a loop structure, which part is called the body of the loop?

Select the correct option

The initial condition

The termination condition

The collection of instructions executed repetitively

The control process

In the algorithm representation, what does the term "syntax" refer to in the context of
primitives?

Select the correct option

The complexity of the algorithm

The symbolic representation of the primitive

The level of detail in algorithm representation

The meaning of the primitive


For controlling vandalism over network connections, a primary prevention technique to filter
out the traffic passing through a point is:

Select the correct option

Proxy server

Antivirus software

Firewall

Auditing software

ͳͲͳ—‹œ‘ǤͶȂ‘Ž—–‹‘ ‹Ž‡
(Solved 3 Quizzes -------CS101 Quiz No. 4 covers Lesson No. 126-162)

Prepared by: Uzair Ali

The resulting relation after a select operation contains tuples that __________ the specified
condition.

Select the correct option

match

violate

ignore

modify
What is the significance of Computer-Aided Software Engineering (CASE) tools in the software
development process?

Select the correct option

They discourage collaboration among teams.

They focus solely on theoretical research.

They hinder progress tracking.

They streamline and simplify various aspects of development.

Which methodology is considered an example of an agile methods?

Select the correct option

Prototyping

Extreme programming

Waterfall model

Spiral model

Why is a stack considered a LIFO structure?

Select the correct option

Entries are removed in the reverse order of storage

Entries are removed in the order they were stored

Entries are removed from the middle

Entries are removed from the base


Which of the following is correct for incremental model?

Select the correct option

1st increment is the complex version

1st increment is the simplified version

Development completes in maximum four increments

All increments are created at once

Explanation: In the Incremental model, the first increment is the simplified version and
subsequent increments progressively enhance the software.

In the context of data structures, what is the primary use of pointers?

Select the correct option

To record the location of data items

To delete instructions

To serve as a counter in loops

To store string data type

__________ is exemplified by two transactions, each of which makes a deduction from the
same account.

Select the correct option

Potential problem

Incorrect summary problem

Lost update problem

Time sharing
What does a copyright notice clearly identify?

Select the correct option

hƐĞƌ͛ƐƉƌŝŶĐŝƉůĞƐ

Liability disclaimers

Product development timelines

Ownership, authorized personnel, and restrictions

The end of a list is called the _______.

Select the correct option

head

devon

tail

bob

What is the role of Integrated Development Environments (IDEs) in software engineering?

Select the correct option

They provide a single, integrated package for developing software.

They focus solely on project planning.

They eliminate the need for project documentation.

They hinder collaboration among developers.

__________ is the field of engineering that deals with designing system's interfaces by
considering the humans physical abilities.

Select the correct option

Ergonomics
Cognetics

Thermodynamics

Genetics

A ________ is a storage area that contains such an encoded address.

Select the correct option

graph

pointer

tree

array

Accuracy can be achieved with the help of testing the result of __________ in the entire
development process.

Select the correct option

Every line of code

Each intermediate step

Last step

Few steps

In a tree structure, what is the top node called?

Select the correct option

Parent node

Leaf node

Terminal node

Root node
The term __________ refers to a collection of data that is multidimensional in the sense that
internal links between its entries make the information accessible from a variety of
perspectives.

Select the correct option

data structure

database

data science

data mining

What are the keywords used in the syntax for a SELECT operation?

Select the correct option

INSERT and DELETE

SELECT and FROM

UPDATE and WHERE

JOIN and GROUP BY

Extreme programming (XP) is an example of:

Select the correct option

throwaway prototyping

rapid prototyping

agile method

evolutionary prototyping
We use ___________ to reduce unnecessary dependencies or effects on other modules.

Select the correct option

inheritance

information hiding

polymorphism

abstraction

The point at which all the steps in a transaction have been recorded in the log is called the
____________.

Select the correct option

roll back

snapshot

schema

commit point

From a lay- person's perspective, design is often equated with

Select the correct option

What

Why

How

Where
A _______ is a collection whose entries have a hierarchical organization similar to that of an
organization chart of a typist.

Select the correct option

queue

tree

stack

graph

In the traditional watertall model, what is the task of the SQA group betore the design stage
begins?

Select the correct option

Approving software requirements specification

Overseeing the implementation

Approving the design

Certifying the conceptual final product

The PROJECT operation allows extraction of columns and places the result in a __________.

Select the correct option

Existing column

Matrix

New row

New relation
Which template does the Java programming language offer to programmers, allowing them
to easily implement objects for performing specific roles within an application?

Select the correct option

Application Programming Interface

.Net Framework Class Library

NumPay

C++ Standard Template Library

To obtain information about an employee, the process of selecting the tuple with the
appropriate identification attribute value results relation with _______ tuple(s).

Select the correct option

Many

single

Few

No

What does basis path testing aim to achieve?

Select the correct option

Applying efforts in a concentrated area.

Identifying better strategies,

Executing each instruction at least once.

Identifying equivalence classes.


How does software maintenance tend to differ from the repair process in other
manufactured products?

Select the correct option

It is less common.

It involves correcting or updating.

It is more time-consuming.

It does not involve changes in the application.

Which of the following is the three-step software development process, incorporating


testing?

Select the correct option

Requirements analysis and confirmation design and validation, and implementation and
testing

Requirements analysis design, and implementation

Debugging, validation, and confirmation

Debugging, software requirements specification, and implementation

#Quizzes_with_Right_Answers #Solved_Quizzes brought to You by Our Whatsapp Group --------


------------------------- Join Our Whatsapp Group Now If you are in 1st Semester of BS (CS/SE/IT)
Currently (Fall-2023) and Send Your all attempted Quizzes Time by Time.

Join now: https://chat.whatsapp.com/KhcHoLdUjOyChPW15ASUt4


ͳͲͳ—‹œ‘ǤͷȂ‘Ž—–‹‘ ‹Ž‡
(Solved 2 Quizzes -------CS101 Quiz No. 5 covers Lesson No. 163-208)

How has computer usage impacted our health and fitness?

Select the correct option

Improved overall fitness

Enhanced mental health

Increased physical activity

Sedentary lifestyles

Information that was once buried in arcane records has become accessible because of:

Select the correct option

Online management

Artificial intelligence

Computer

Database

The default theme of MS-Word document is:

Select the correct option

Office

Paper

Word

Flow
In MS Word, we can apply bullets from home ribbon group called _________.

Select the correct option

Paragraph

Clipboard

Font

Styles

Which of the following is not a Social issue?

Select the correct option

Cyber Bullying

Identity Theft

Contesting Surveillance

Privacy

What does the expander arrow in the Font group do?

Select the correct option

Increases font size.

Changes the font colour.

Underlines text.

Opens the Font dialog window.


Which of the following is a famous example of word processing software?

Select the correct option

MS Access

MS PowerPoint

MS Excel

MS Word

In MS Word, we can set line spacing from group _________.

Select the correct option

Insert

Font

Clipboard

Paragraph

How have governments responded to the issue of email spam?

Select the correct option

They have implemented specific regulations.

They have encouraged spam activities.

They have increased their own spam emails.

They have ignored the problem.


Content filtering is used to implement company policies related to usage of:

Select the correct option

Commercial spyware

Information system

Laws

Overspending

How can you resize a Text Box in an MS Word document?

Select the correct option

Clicking in the middle of the Text Box

Dragging the corner of the Test Box using the mouse

Select Test Box and press the '+"key on the keyboard

Double-clicking on the Text Box

In which part of the world, spam-law requirements are generally less strict?

Select the correct option

Australia

Europe

Africa, Asia, and South America

North America

Most famous word processor is:

Select the correct option

Notepad
MS-word

MS-Excel

Wordpad

In Microsoft Word, which group under the Insert tab helps in adding special characters,
equations, and mathematical symbols?

Select the correct option

Comments

Text

Illustrations

Symbols

Meaning of a statement in natural language depends on its:

Select the correct option

Grammar

Style

Context

Formatting

How can you input text into a table cell in Microsoft Word?

Select the correct option

Right-click on the cell and select "Type Text".

Click once on the cell and start typing.

Double-click on the cell and press Ctrl + T.

Click on Insert tab and start typing.


Which of the following is correct in context of content filtering?

Select the correct option

It matches strings of characters to allow content through.

It is not part of Internet firewalls.

It only filters content related to malware.

It allows all content to pass through without restrictions.

Which of the following commands is available in the drop-down menu of the 'Wrap Text"
feature in MS Word?

A. Top and Bottom

B. Behind Text

C. In front of Text

Select the correct option

A only

A, B and C

A and B

B and C

Which feature of MS Word offers to create special effects like adding artistic flair to a text"?

Select the correct option

Drop Cap

WordArt

SmartArt

Text Box
The Arrange group is placed on the _________ ribbon in MS Word.

Select the correct option

Reference

Review

Layout

Home

In Microsoft Word, what is the goal behind placing commands within groups and tabs?

Select the correct option

To minimize the number of mouse clicks

To confuse users

To hide commands from users

To discourage software usage

#Quizzes_with_Right_Answers #Solved_Quizzes brought to You by Our Whatsapp Group --------


------------------------- Join Our Whatsapp Group Now If you are in 1st Semester of BS (CS/SE/IT)
Currently (Fall-2023) and Send Your all attempted Quizzes Time by Time.

Join now: https://chat.whatsapp.com/KhcHoLdUjOyChPW15ASUt4

You might also like