It Contains the Quiz no. 3 , Quiz no. 4 and Quiz no.
ͳͲͳ
For the Preparation of Final Term
Examinations
Prepared by: Uzair Ali
##########################################################
Quizzes_with_Right_Answers #Solved_Quizzes brought to You by Our
Whatsapp Group --------------------------------- Join Our Whatsapp Group
Now If you are in 1st Semester of BS (CS/SE/IT) Currently (Fall-2023)
and Send Your all attempted Quizzes Time by Time.
Join now: https://chat.whatsapp.com/KhcHoLdUjOyChPW15ASUt4
Fall 2023
ͳͲͳǤ͵Ȃ
(Solved 10 Quizzes -------CS101 Quiz No. 3 covers Lesson No. 82-125)
Why does the composition of loop control deserve attention?
Select the correct option
It is only relevant for simple algorithms.
It has no impact on the algorithm's performance.
It is typically error-free and does not require attention.
It is the more error-prone part of the structure.
The set of instructions in a computer language, to get the desired result is known as:
Select the correct option
A decision table
An algorithm
A pseudo code
A program
The language understood by a computer without translation is known as:
Select the correct option
Assembly language
Command Language
High Level Language
Machine Language
There are ..... iterations in following pseudo code.
def FindFactorial():
fact = 2
i=1;
While (i <= 7)
fact=fact*i;
i=i+1;
Select the correct option
Explanation: There are 7 iterations in the given pseudo code. This is evident from the code
itself, which uses a while loop to iterate through the values of variable i from 1 to 7.
What is the purpose of spam filters?
Select the correct option
To filter unwanted email
To act as an intermediary between client and server
To block outgoing messages
To learn the internal structure of an intranet
What property is crucial for pseudocode to serve its purpose in expressing algorithms?
Select the correct option
Aesthetic appeal
Complicated notation
Familiarity with programming languages
Consistent, concise notation for recurring semantic structures
What is the purpose of a firewall installed at the gateway of an organization's intranet?
Select the correct option
To establish contact through nonexistent servers
To collect information about internal structure
To act as an intermediary between client and server
To block incoming messages from known trouble sources
The binary search algorithm uses.......
Select the correct option
Divide and conquer method
Linear search
Quick sort technique
Bubble sort technique
What is the primary purpose of encryption in the context of data transfer over networks?
Select the correct option
To speed up data transfer
To hide data from users
To compress data
To ensure data confidentiality
What are the three activities involved in the control of a loop structure?
Select the correct option
Launch, Halt, Adjust
Initialize, Test, Modify
Begin, End, Continue
Start, Stop, Proceed
What term does computer science use for program units that can be used as abstract tools in
other applications?
Select the correct option
Script
Subprogram
Software part
Paragraph
By attaching the __________ to a message, the sender can mark the message as authentic.
Select the correct option
Dual Signature
Security
Protocol
Single Signature
In computer programming, what comes after the "if" keyword in an if-statement?
Select the correct option
Else
StatementB
Condition
StatementA
Which of the following is responsible for maintaining the anonymity of the actual client from
the server over the Internet?
Select the correct option
Routers
Proxy server
Spam Filters
Firewall
In the context of network security, what is the term used for pretending to be a party other
than oneself to gain an illegitimate advantage?
Select the correct option
Proxying
Masking
Spoofing
Masquerading
What is the ultimate goal when sorting a list within itself using the insertion sort algorithm?
Select the correct option
Shuffling entries
Clearing off space
Efficient use of storage space
Efficient use of time to sort a list in quick time
Which of the following symbol is used as assignment operator in Ada.
Select the correct option
:=
Which of the following symbol is used to represent Boolean operator for logical AND?
Select the correct option
!&
&
&&
What is the role of Phase 3 in the problem-solving process in the context of program
development?
Select the correct option
Evaluating the solution
Getting an idea of how an algorithmic function might solve the problem
Understanding the problem
Formulating the algorithm as a program
In Pakistan, what is the punishment for first-time offenders under the Cyber Security Law
passed in 2016?
Select the correct option
10 years
20 years
5 years
15 years
Which of the following might be used to convert high-level language instructions into
machine language?
Select the correct option
An interpreter
Operating environment
Framework
Applications software
A translator which takes assembly language program as input & produce machine language
code as output is known as:
Select the correct option
Assembler
Debugger
Interpreter
Compiler
In the case of highly standardized languages, compiler designers often provide features,
sometimes called
Select the correct option
Language symbols
Language code
Language translators
Language extension
The ________ in the state of the process must be sufficient to determine uniquely and
completely the actions required by each step.
Select the correct option
Program
Instructions
Data
Information
A private key is used to ________ messages.
Select the correct option
Encrypt
Decrypt
Send
Receive
In the algorithm of Sequential search, what indicates a successful search from the given
cases?
Select the correct option
List is empty
Equality of TargetValue and TestEntry
Target value is greater than TestEntry
Reaching the end of the list
What is the primary focus of pseudocode in the context of algorithm development?
Select the correct option
Algorithmic complexity
Intuitive notational systems
5ynton-semantic structures
Formal programming languages
What does the variable 'f' represent in the pseudo-code?
f=1
i=1;
While (i <= n):
f=f*i;
i=i+1;
Select the correct option
The loop counter
The initial value of the loop
The condition for loop termination
The factorial of the number
What is the purpose of the given pseudo-code?
f=1
i=1;
While (i <= n):
f=f*i;
i=i+1;
Select the correct option
To determine the maximum value in a list
To calculate the factorial of a given number
To identify prime numbers
To sort the number list
What is the role of the loop counter 'i' in the given pseudo-code?
f=1
i=1
While (i <= n):
f=f*i
i=i+1
Select the correct option
To reset the loop condition
To determine the initial value of "f'
To control the number of iterations in the loop
To compare with the value of 'n"
Explanation: In the given pseudo-code, the loop counter 'i' is used to control the number of
iterations in the loop. It is incremented in each iteration until it reaches the value of 'n'.
Always write a pseudo code in __________ manner.
Select the correct option
Independent
Dependent
Unambiguous
Ambiguous
Pseudo code is language ____________.
Select the correct option
Independent
Algorithm
Sequence
Dependent
What is the output of the following code?
int sum = 14;
if (sum < 20)
cout << "Under *;
if (sum >20)
cout << "Over *;
Select the correct option
Under the limit
Under
Over the limit
Over
What will be the output of the following statement?
int a = 10 + 4.867;
Select the correct option
14
10
14.867
Compiler error.
Select the first entry in List to be TestEntry.
while (TargetValue > TestEntry and there remain entries to be considered):
Select the next entry in List as TestEntry.
if (TargetValue == TestEntry):
Declare search a success.
else:
Declare search a failure.
Select the correct option
To terminate the search
To compare TestEntry with TargetValue
To iterate through the list entries
To sort the list
Float CGPA=2.5;
If (CGPA>=3.0)
Cout << "Give Scholarship";
Else
Cout << "Sorry you do not qualify for the scholarship";
It will show output
Select the correct option
Give Scholarship
Display none
Sorry you do not qualify for the scholarship
Good
Float CGPA=3.5;
If (CGPA>=3.0)
Cout << "Give Scholarship";
Else
Cout << "Sorry you do not qualify for the scholarship";
It will show output
Select the correct option
Give Scholarship
Good
Display none
Sorry you do not qualify for the scholarship
What technique is used by spam filters to distinguish between desirable email and spam?
Select the correct option
Learning through a training process
Firewalling
Spoofing
Proxying
Explanation: The technique used by spam filters to distinguish between desirable email and
spam is learning through a training process, where the filter is trained to recognize certain
characteristics or patterns in messages that are commonly associated with spam.
Post test loop structure refer to?
Select the correct option
Test for termination is performed before the body is executed
Test for termination is performed after the body is executed
Test for termination is performed with the body is executed
Test for termination is performed as well as the body is executed
Why is Phase 1 of problem-solving considered important in the problem-solving process?
Select the correct option
It helps gain a complete understanding of the problem.
It provides a systematic approach to problem-solving.
It directly leads to the formulation of the algorithm.
It precedes all other problem-solving phases.
Phase 1 of problem-solving steps is _____________.
Select the correct option
Evaluate the program for accuracy and for its potential as a tool for solving other problems
Formulate the algorithm and represent it as a program
Get an idea of how an algorithmic function might solve the problem.
Understand the problem.
What is the significance of the termination condition in the context of loop control?
Select the correct option
It prevents the loop from executing the body
It ensures the termination of the looping process
It has no impact on loop control
It ensures the loop body is executed indefinitely
In the provided pseudo-code, what is the role of the "Current" variable?
def FindMax():
max = first number in the list
Current = second number in the list
While (elements in the list exist)
If (maxcurrent)
max=current
Current = next value in the list
Select the correct option
It indicates the position of the current element in the list
It represents the minimum value in the list
It stores the current value being compared
It holds the maximum value in the list
How is the algorithm for converting temperature readings from Celsius to Fahrenheit
traditionally represented in the text?
Select the correct option
As a set of electronic instructions
As a physical circuit
As an algebraic formula
As a graphical representation
In the context of the insertion sort algorithm, what is the restriction imposed on sorting a
list?
Select the correct option
Make a tree of the list to sort entries
Insertion sort can only be used on the list containing numeric values
Sort using the same storage space without extra memory space
Create a copy of the list to sort items one by one into the new list
What is the ASCIl code for alphabet "A"?
Select the correct option
62
65
64
63
Explaination: $6&,OFRGHIRUDOSKDEHW$LVZKLOHIRU´DµLV
What is collectively called an assembly language in the context of programming?
Select the correct option
Compiler
Machine language
High-level language
Mnemonic system
In the context of the provided pseudocode, what is the purpose of the statement 'Count =
Count-1'?
def Greetings():
Count = 3
while (Count > 0):
print ('Hello')
Count = Count-1
Select the correct option
To reset the counter
To print a message
To increment the counter
To decrement the counter
Loop, is executed in a repetitive fashion under the direction of some
Select the correct option
Halting process
Sequence process
Control process
Under some background knowledge
What is the formal definition of an algorithm?
Select the correct option
An ordered set of unambiguous, executable steps
A sequence of parallel executable steps
A random set of steps
An ordered set of ambiguous steps
What does it mean for an algorithm to be "unambiguous," according to the formal definition
of computer algorithms?
Select the correct option
The steps have multiple interpretations.
The steps are clear and have a unique interpretation.
It can be executed by any computer.
It involves parallel processing.
Explanation: An algorithm is considered unambiguous if its steps are clear and have a unique
interpretation, meaning they do not have multiple interpretations.
What explains the role of the "Take a sip of tea" step in the context of the algorithm for
making a cup of tea and its ____________ impact on the overall process?
Select the correct option
It fetches a new cup.
It is irrelevant to the tea-making algorithm.
It concludes the algorithm.
It adds complexity to the algorithm.
Computer fraud and abuse act passed in
Select the correct option
1980
1990
1984
1983
Explaination: The Computer Fraud and Abuse Act (CFAA) was actually enacted in 1986 as an
amendment to existing computer fraud law.
Which one is a unary operator?
Select the correct option
OR
AND
EQUAL
NOT
Explanation: NOT is a unary operator. Unary operators are operators that operate on a single
operand or argument.
Which mathematician presented loosely defined problem-solving phases in 1945?
Select the correct option
G. Pollock
G. Polya
G. Palmer
G. Pascal
What is the role of "getting your foot in the door" in the problem-solving process?
Select the correct option
It guarantees a correct solution.
It opens the way to extending knowledge.
It provides a philosophical perspective.
It prevents direct confrontation.
Explanation: The role of "getting your foot in the door" in the problem-solving process is to
open the way to extending knowledge by providing a starting point or a first step towards
understanding the problem or finding a solution.
The description of the object's properties is called
Select the correct option
Class
Instance
Object
Function
What does the Prevention of Electronic Crimes Ordinance, 2007, in Pakistan aim to address?
Select the correct option
Cybersecurity education
Prevention of electronic crimes
International cooperation
Wiretapping regulation
Explanation: The Prevention of Electronic Crimes Ordinance, 2007, in Pakistan aims to address
the prevention of electronic crimes, which includes unauthorized access, system interference,
electronic fraud, forgery, and other related offenses.
Let a unsorted list Fred, Alex, Diana ,Byron,Carol
Which one will be sorted at last
Select the correct option
Fred
Diana
Alex
Carol
Explanation: If we use the bubble sort algorithm to sort the list Fred, Alex, Diana, Byron, Carol,
then Fred will be sorted at last.
The imperative paradigm, also known as the Particular machine
Select the correct option
Non traditional paradigms
Non-Procedural paradigms
Traditional paradigms
Procedural paradigms
What is the primary goal of the Sequential search algorithm?
Select the correct option
Detecting duplicate entries
Searching for a specific target value
Sorting a list
Randomizing list elements
How many times will the loop in the example below execute?
int counter=1;
while(counter <= 5)
cout << counter;
counter=counter+2;
Select the correct option
3 times
6 times
5 times
4 times
Explanation: The loop in the code snippet will execute 3 times. It will print the values 1, 3 and 5.
if (TargetValue == TestEntry):
In the above condition, what is " == "?
Select the correct option
Conditional loop
Expression
Assignment Operator
Equal to Operator
Why is the initialization step important in loop control?
Select the correct option
It ensures the termination of the looping process
It compares the current state to the termination condition
It establishes a starting condition that will be modified toward the termination condition
It executes the loop body
What is the purpose of the provided pseudocode?
def FindMax():
max = first number in the list
Current = second number in the list
While (elements in the list exist)
If (max<current)
max=current
Current = next value in the list
Select the correct option
Finding the average of a list
Finding the maximum number in a list
Counting the number of elements in a list
Sorting a list in ascending order
In the provided pseudo-code, what is the role of the "Current" variable?
def FindMax(:
max = first number in the list
Current = second number in the list
While (elements in the list exist)
If (max<current)
max=current
Current = next value in the list
Select the correct option
It indicates the position of the current element in the list
It holds the maximum value in the list
It stores the current value being compared
It represents the minimum value in the list
What is the main characteristic of public-key encryption systems?
Select the correct option
The use of any random key for encryption and the same key for decryption
The use of a single key for encryption and decryption
The use of two keys for encryption and decryption
Knowledge of encryption allows decryption
Third generation language attributes refer to
Select the correct option
Particular machine
None of these
For all machine (Machine Independence)
For only required machine
What is the purpose of an assignment statement in programming?
Select the correct option
To declare variables
To terminate the program
To request input from the user
To assign a value to a variable
A ------- alters the execution sequence of the program
Select the correct option
Assignment statement
Control statement
Division
Modulus
__________ is a package containing a party's name and that party's public key.
Select the correct option
Certificate
Security
Antivirus
Contract
What is a digital signature in the context of public-key encryption?
Select the correct option
A method to decrypt messages with private key
An authentic mark on the message produced with the private key
A certificate provided by a trusted authority
An encrypted message with public key
In the Java programming language, what is the equivalent term for an 'activation" in the
context of concurrent processing?
Select the correct option
Function
Operation
Thread
Task
In the declarative paradigm, what does a programmer focus on when presented with a
problem?
Select the correct option
Developing a precise statement of the problem
Finding a general-purpose algorithm
Describing detailed algorithms
Developing a sequence of commands
What would be the next statement?
Def findmax():
Max = first number in the list
Current = second number in the list
While (elements in the list exist)
Select the correct option
Current = next value in the list
Max=current
Max=value
If (max<current)
In the context of the provided pseudocode, what is the purpose of the statement "Count = 3?
def Greetings():
Count=3
While (Count > 0):
Print ('Hello')
Count= Count-1
Select the correct option
To define a loop condition
To request a service
To print a message
To initiate a counter
What does the modification step in loop control accomplish?
Select the correct option
Compares the current state to the termination condition
Establishes a starting condition
Terminates the loop
Moves the condition toward the termination condition
True parallel processing requires ------- CPU cores
Select the correct option
Single
None of these
Exact two cores
Multiple
Which organizations have adopted and published standards for popular programming
languages to address the lack of agreement on language definitions?
Select the correct option
Compiler Writers Association
Programming Language Alliance
International Compiler Consortium
American National Standards Institute (ANSI) and International Organization for
Standardization (ISO)
What might be true about the value of finding a related problem in problem-solving?
Select the correct option
It helps develop general algorithms.
It adds complexity to the current problem.
It is irrelevant to the problem-solving approach.
It complicates the solution process.
What condition triggers the termination of the sequential search algorithm as a failure on an
ordered list of names?
Select the correct option
List is empty
Equality of TargetValue and TestEntry
TestEntry is smaller than TargetValue
Reaching a name greater than the target name
Which of the following terms refers to the process in which a small request is initially made
and detailed solution is shared later?
Select the correct option
Low-balling
High-balling
Door-in-the-face technique
Foot-in-the-door technique
What is the formal definition of an algorithm?
Select the correct option
An ordered set of unambiguous, executable steps
A random set of steps
A sequence of parallel executable steps
An ordered set of ambiguous steps
In the context of a loop structure, which part is called the body of the loop?
Select the correct option
The initial condition
The termination condition
The collection of instructions executed repetitively
The control process
In the algorithm representation, what does the term "syntax" refer to in the context of
primitives?
Select the correct option
The complexity of the algorithm
The symbolic representation of the primitive
The level of detail in algorithm representation
The meaning of the primitive
For controlling vandalism over network connections, a primary prevention technique to filter
out the traffic passing through a point is:
Select the correct option
Proxy server
Antivirus software
Firewall
Auditing software
ͳͲͳǤͶȂ
(Solved 3 Quizzes -------CS101 Quiz No. 4 covers Lesson No. 126-162)
Prepared by: Uzair Ali
The resulting relation after a select operation contains tuples that __________ the specified
condition.
Select the correct option
match
violate
ignore
modify
What is the significance of Computer-Aided Software Engineering (CASE) tools in the software
development process?
Select the correct option
They discourage collaboration among teams.
They focus solely on theoretical research.
They hinder progress tracking.
They streamline and simplify various aspects of development.
Which methodology is considered an example of an agile methods?
Select the correct option
Prototyping
Extreme programming
Waterfall model
Spiral model
Why is a stack considered a LIFO structure?
Select the correct option
Entries are removed in the reverse order of storage
Entries are removed in the order they were stored
Entries are removed from the middle
Entries are removed from the base
Which of the following is correct for incremental model?
Select the correct option
1st increment is the complex version
1st increment is the simplified version
Development completes in maximum four increments
All increments are created at once
Explanation: In the Incremental model, the first increment is the simplified version and
subsequent increments progressively enhance the software.
In the context of data structures, what is the primary use of pointers?
Select the correct option
To record the location of data items
To delete instructions
To serve as a counter in loops
To store string data type
__________ is exemplified by two transactions, each of which makes a deduction from the
same account.
Select the correct option
Potential problem
Incorrect summary problem
Lost update problem
Time sharing
What does a copyright notice clearly identify?
Select the correct option
hƐĞƌ͛ƐƉƌŝŶĐŝƉůĞƐ
Liability disclaimers
Product development timelines
Ownership, authorized personnel, and restrictions
The end of a list is called the _______.
Select the correct option
head
devon
tail
bob
What is the role of Integrated Development Environments (IDEs) in software engineering?
Select the correct option
They provide a single, integrated package for developing software.
They focus solely on project planning.
They eliminate the need for project documentation.
They hinder collaboration among developers.
__________ is the field of engineering that deals with designing system's interfaces by
considering the humans physical abilities.
Select the correct option
Ergonomics
Cognetics
Thermodynamics
Genetics
A ________ is a storage area that contains such an encoded address.
Select the correct option
graph
pointer
tree
array
Accuracy can be achieved with the help of testing the result of __________ in the entire
development process.
Select the correct option
Every line of code
Each intermediate step
Last step
Few steps
In a tree structure, what is the top node called?
Select the correct option
Parent node
Leaf node
Terminal node
Root node
The term __________ refers to a collection of data that is multidimensional in the sense that
internal links between its entries make the information accessible from a variety of
perspectives.
Select the correct option
data structure
database
data science
data mining
What are the keywords used in the syntax for a SELECT operation?
Select the correct option
INSERT and DELETE
SELECT and FROM
UPDATE and WHERE
JOIN and GROUP BY
Extreme programming (XP) is an example of:
Select the correct option
throwaway prototyping
rapid prototyping
agile method
evolutionary prototyping
We use ___________ to reduce unnecessary dependencies or effects on other modules.
Select the correct option
inheritance
information hiding
polymorphism
abstraction
The point at which all the steps in a transaction have been recorded in the log is called the
____________.
Select the correct option
roll back
snapshot
schema
commit point
From a lay- person's perspective, design is often equated with
Select the correct option
What
Why
How
Where
A _______ is a collection whose entries have a hierarchical organization similar to that of an
organization chart of a typist.
Select the correct option
queue
tree
stack
graph
In the traditional watertall model, what is the task of the SQA group betore the design stage
begins?
Select the correct option
Approving software requirements specification
Overseeing the implementation
Approving the design
Certifying the conceptual final product
The PROJECT operation allows extraction of columns and places the result in a __________.
Select the correct option
Existing column
Matrix
New row
New relation
Which template does the Java programming language offer to programmers, allowing them
to easily implement objects for performing specific roles within an application?
Select the correct option
Application Programming Interface
.Net Framework Class Library
NumPay
C++ Standard Template Library
To obtain information about an employee, the process of selecting the tuple with the
appropriate identification attribute value results relation with _______ tuple(s).
Select the correct option
Many
single
Few
No
What does basis path testing aim to achieve?
Select the correct option
Applying efforts in a concentrated area.
Identifying better strategies,
Executing each instruction at least once.
Identifying equivalence classes.
How does software maintenance tend to differ from the repair process in other
manufactured products?
Select the correct option
It is less common.
It involves correcting or updating.
It is more time-consuming.
It does not involve changes in the application.
Which of the following is the three-step software development process, incorporating
testing?
Select the correct option
Requirements analysis and confirmation design and validation, and implementation and
testing
Requirements analysis design, and implementation
Debugging, validation, and confirmation
Debugging, software requirements specification, and implementation
#Quizzes_with_Right_Answers #Solved_Quizzes brought to You by Our Whatsapp Group --------
------------------------- Join Our Whatsapp Group Now If you are in 1st Semester of BS (CS/SE/IT)
Currently (Fall-2023) and Send Your all attempted Quizzes Time by Time.
Join now: https://chat.whatsapp.com/KhcHoLdUjOyChPW15ASUt4
ͳͲͳǤͷȂ
(Solved 2 Quizzes -------CS101 Quiz No. 5 covers Lesson No. 163-208)
How has computer usage impacted our health and fitness?
Select the correct option
Improved overall fitness
Enhanced mental health
Increased physical activity
Sedentary lifestyles
Information that was once buried in arcane records has become accessible because of:
Select the correct option
Online management
Artificial intelligence
Computer
Database
The default theme of MS-Word document is:
Select the correct option
Office
Paper
Word
Flow
In MS Word, we can apply bullets from home ribbon group called _________.
Select the correct option
Paragraph
Clipboard
Font
Styles
Which of the following is not a Social issue?
Select the correct option
Cyber Bullying
Identity Theft
Contesting Surveillance
Privacy
What does the expander arrow in the Font group do?
Select the correct option
Increases font size.
Changes the font colour.
Underlines text.
Opens the Font dialog window.
Which of the following is a famous example of word processing software?
Select the correct option
MS Access
MS PowerPoint
MS Excel
MS Word
In MS Word, we can set line spacing from group _________.
Select the correct option
Insert
Font
Clipboard
Paragraph
How have governments responded to the issue of email spam?
Select the correct option
They have implemented specific regulations.
They have encouraged spam activities.
They have increased their own spam emails.
They have ignored the problem.
Content filtering is used to implement company policies related to usage of:
Select the correct option
Commercial spyware
Information system
Laws
Overspending
How can you resize a Text Box in an MS Word document?
Select the correct option
Clicking in the middle of the Text Box
Dragging the corner of the Test Box using the mouse
Select Test Box and press the '+"key on the keyboard
Double-clicking on the Text Box
In which part of the world, spam-law requirements are generally less strict?
Select the correct option
Australia
Europe
Africa, Asia, and South America
North America
Most famous word processor is:
Select the correct option
Notepad
MS-word
MS-Excel
Wordpad
In Microsoft Word, which group under the Insert tab helps in adding special characters,
equations, and mathematical symbols?
Select the correct option
Comments
Text
Illustrations
Symbols
Meaning of a statement in natural language depends on its:
Select the correct option
Grammar
Style
Context
Formatting
How can you input text into a table cell in Microsoft Word?
Select the correct option
Right-click on the cell and select "Type Text".
Click once on the cell and start typing.
Double-click on the cell and press Ctrl + T.
Click on Insert tab and start typing.
Which of the following is correct in context of content filtering?
Select the correct option
It matches strings of characters to allow content through.
It is not part of Internet firewalls.
It only filters content related to malware.
It allows all content to pass through without restrictions.
Which of the following commands is available in the drop-down menu of the 'Wrap Text"
feature in MS Word?
A. Top and Bottom
B. Behind Text
C. In front of Text
Select the correct option
A only
A, B and C
A and B
B and C
Which feature of MS Word offers to create special effects like adding artistic flair to a text"?
Select the correct option
Drop Cap
WordArt
SmartArt
Text Box
The Arrange group is placed on the _________ ribbon in MS Word.
Select the correct option
Reference
Review
Layout
Home
In Microsoft Word, what is the goal behind placing commands within groups and tabs?
Select the correct option
To minimize the number of mouse clicks
To confuse users
To hide commands from users
To discourage software usage
#Quizzes_with_Right_Answers #Solved_Quizzes brought to You by Our Whatsapp Group --------
------------------------- Join Our Whatsapp Group Now If you are in 1st Semester of BS (CS/SE/IT)
Currently (Fall-2023) and Send Your all attempted Quizzes Time by Time.
Join now: https://chat.whatsapp.com/KhcHoLdUjOyChPW15ASUt4