are attempts by individuals to obtain confidential information from you by falsifying their identity?

A. Computer viruses
B. Phishing trips
C. Phishing scams
D. Spyware scams
Correct answer is: C. Phishing scams

In excel columns are labelled as                           ?

A. A, B, C, etc.
B. 1, 2, 3, etc.
C. A1, A2, A3,
D. $A$1, $A$2,
Correct answer is: A. A, B, C, etc.

We can remove / hide border of a shape by selecting ?

A. No Line
B. No Outline
C. White Line
D. No Border
Correct answer is: B. No Outline

Which of the following are actions you can assign to an action button or slide object?

A. Run a macro
B. Play a sound
C. Hyper link
D. All of above
Correct answer is: D. All of above

Which key on the keyboard can be used to view slide show in Ms PowerPoint?

A. F1
B. F2
C. F5
D. F10
Correct answer is: C. F5

Which of the following is not a way to cut ext?

A. Select the text and press the delete button
B. Select the text and select Edit, Cut from the menu
C. Select the text and click the Cut button on the toolbar
D. Select the text and press Ctrl + X
Correct answer is: A. Select the text and press the delete button

in PowerPoint If you select Insert >> Picture >> From File

A. You can insert pictures and clipArts
B. You can insert clipArts only
C. You can insert pictures only
D. None of above
Correct answer is: C. You can insert pictures only

To select one hyperlink after another during a slide presentation, what do you press?

A. Tab
B. Ctrl + K
C. Ctrl + h
D. All of above
Correct answer is: A. Tab

In Microsoft PowerPoint the entry effect as one slide replaces another in a show is called a (an)                               ?

A. animation
B. slide transition
C. custom animation
D. preset animation
Correct answer is: B. slide transition

Which of the following should be used when you want to add a slide to an existing presentation?

A. File, add a new slide
B. Insert, New slide
C. File Open
D. File, New
Correct answer is: B. Insert, New slide

Scroll to Top