Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
The present overview of IT tools used in day to day use of computers and database operations. Designed to provide knowledge on various hardware and software.
Spans several cities, states, or countries, and is owned by different parties.
The _______________ provides the space for your worksheets and workbook elements such as charts.
The __________, or cell reference area, displays the cell reference of the active cell.
_____ appear horizontally and are identified by numbers.
Allows data and programs to be sent to the CPU.
It is the general name for unanticipated or undesired effects in programs or program parts, caused by an agent intent on damage.
A ______ is a preset collection of design elements, including fonts, colors, and effects.
Which keyboard shortcut bolds selected text?
Type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure
Where can you find basic file management commands and program options?
###### means in a Cell:
Deletes the character to the right of the insertion point.
During a slide show, pressing the Esc key:
It is the processed and organized data presented in a meaningful form
It is a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single unit for information.
Is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details.
The act of surreptitiously listening to a private conversation, typically between hosts on a network.
Which of the following should you use if you want all the slide in the presentation to have the same “look”?
This is a closed source commercial presentation program developed by Microsoft.
A mechanism helps in establishing proof of identification.
A number of letter that appears little above the normal text is called :
Deletes the character to the left of the insertion point
Which of the following actions or commands cannot be undone in Microsoft Word?
HTML stands for?
To alert Excel that you are entering a formula and not text, type aNo ____________ preceding the formula.
The ROM stands for?
This describes a situation where information, thought as secure, is released in an untrusted environment.
Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred.
Convert 101101 from binary to decimal.
Convert 110100101010 from binary to decimal.
It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of your hand or in your pocket.
The 2’s complement of 15 is ____________
It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/ IP) to serve billions of users worldwide.
A box on a slide reserved for the title of a presentation or slide
The confidential information sent by A to B which is accessed by C without the permission or knowledge of A and B.
It is a generic term for organized collections of computer data and instructions
It is now an essential communication tools in business.
_________ of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Daniel wants each slide to appear with a checkerboard effect. Which of the following would you apply to cause this effect?
_______________ refers to an Internet connection that is established using a modem.
Slides that are unformatted and have no color scheme.
A slider on the status bar that is dragged to enlarge or decrease the display size of the document in the document window
Contains commands for working with the document, organized by tabs.
The following are Master Slide of Microsoft PowerPoint except
A ___________ is a unique name associated with a specific IP address by a program that runs on an Internet host computer.
A multi-user computer capable of supporting from 10 to hundreds of users simultaneously.
Moves data to a new line when the cell is not wide enough to display all the contents
It means that assets are accessible to authorized parties at appropriate times.
A symbol such as a heavy dot or other character that precedes text in a presentation is called aNo ____.
A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.
Work in ___________ when you need to organize and develop the content of your document.
The button that provides a shortcut to typing formulas.
A box with a dotted border text that resides in your layout to enter text
A collection of linked Web pages that has a common theme or focus is called a Web site.
File may be viewed, copied, executed (if appropriate), but not changed. It can be deleted.
To save an existing document with a new file name or to save an existing document in a new location, which command is used?
Internet provides facility to access wide range of Audio/Video songs, plays films.
Which of the following is not a binary number?
It is a collection of independent and unorganized facts.
Short cut key to highlight all elements in a document.
The letters in Excel represent the...
It is the software that you run on your computer to make it work as a web client.
Specifies where data is lined up within the cell
______________ is a software program produced by Microsoft that allows users to organize, format and calculate data with formulas using a spreadsheet system.
Every worksheet is made up of thousands of rectangles, which are called _________.
Displays your workbook in full-screen mode and completely hides the Ribbon.
Add the following unsigned binary numbers: 0110 and 0101.
What function adds all of the numbers in a range of cells?
Press ______ to move the insertion point to the beginning of the document.
Rules that govern data communication.
The hexadecimal representation of 14 is _______________
When you use your Internet connection to become part of the Web, your computer becomes a __________ in a worldwide client/server network.
_____________ adjusts the size of the windows so that they share the screen equally.
In Excel, the name of the bar where information appears as you input data is called?
The numbers in Excel represent the...
This view is good for most simple word-processing tasks, such as typing, editing, and formatting.
Slide Themes that have design concepts, fonts, and color schemes.
A storage module made of flash memory chips.
What is the World Web usually called for short?
Underline, shadow, emboss, superscript, and subscript are all examples of text ____.
Effects applied to placeholders or other content to move the content in unique ways on the slide is which of the following?
Which command is used to insert a sound clip into a slide?
It consists of information organized into Web pages containing text and graphic images.
What year did the first Microsoft Word-based virus, spreads worldwide using macro commands.
In the __________________, you can enter or edit data, a formula, or a function that will appear in a specific cell.
___________ is a weakness which allows an attacker to reduce a system's information assurance.
When you reach the right margin, the text continues on the next line. This feature is called _______.
What does the mouse pointer look like in a spreadsheet?
How can you stop a slide show ?
Which action would Drake take to insert the contents from the Office Clipboard into a document?
___________, a University of Southern California doctoral student, comes up with term “computer virus.”
This view is optimized for reading on a portable device, such as a tablet or smart phone.
The program is meant to make computers more efficient, but later hackers modify it into computer viruses that destroy or alter data.
It is a combination of a black hat and a white hat hacker.
This command allows you to see these hidden formatting marks.
___________________ is a presentation application that enables an individual from any technical level to create a dynamic and professional-looking presentation
On the View Ribbon, which command allows the document to be viewed as it would appear in a multilevel outline?
Bulleted text can be converted to SmartArt easily
What is a slide transition ?
An _________ is a constant (text or number) or cell reference used in a formula.
This is the brain of the computer.
It is an electronic machine that follows a set of instructions in order that it may be able to accept and gather data and transform these into information.
Convert the binary equivalent 10101 to its decimal equivalent.
A section of the ribbon in Office programs that identifies groups of commands based on their groups
Display headings and text in outline form so you can see the structure of your document and reorganize easily.
A group of selected cells is called a _____.
It primarily provides services for running applications on a computer system.
It displays the location, or "name" of a selected cell.
The value of base in a decimal number system is ____________
Attack launched by a third-party computer by using someone else's computer to launch an attack, it becomes far more difficult to track down the actual attacker.
These are designated by dotted lines; they appear on a slide as guides, but they will not appear on the finished presentation.
In order to save an existing document with a different name you need to:
You can change the format appearance of text and slides in the Slide View as well. Formatting can be applied to all slides at the same time as in the Master View or only on an individual slide.
____________ are visual special effects that you see when you move from one slide to the next.
Text in Excel is automatically aligned _____________.
Rotates cell contents to a angle or vertically
Device that connects a user to the Internet.
It is the tangible part of a computer system.
To sort data in Excel, go to the __________ ribbon.
It refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched
How can you display hidden text, such as tabs and paragraph marks?
The input hexadecimal representation of 1110 is _______________
The octal equivalent of 1100101.001010 is ______
An unauthorized user gaining physical access to a computer (or part thereof) can perform many functions, install different types of devices to compromise security, including operating system modifications, software worms, key loggers, and covert listening devices.
1 TB is compose of?
Microsoft Excel is what kind of software?
Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them
Amount of data that can be transferred from one point to another in a certain time period
Connects workstations and peripheral devices that are in close proximity.
Which key deletes text to the left of the insertion point?
_______ determines the best width for a column or the best height for a row.
A fast way to add up this column of numbers is to click on the cell below the numbers and then:
Which of the following is worksheet view of Microsoft Excel 2013?
Multiple pieces of data, sent simultaneously to increase the transmission rate
Show how a document will look when it is printed.
Special effects used to introduce slides in a presentation are called
An Excel file format extension is
To apply center alignment to a paragraph we can press
To specify the size of the viewable area and allow users to reduce or enlarge the size of a document window, which command is used?
It is the course of doing things in a sequence of steps.
Which commonly used animation effect makes text on a slide appear in the presentation?
A customization toolbar on the left side of a Microsoft application program window's title bar, containing icons that you click to quickly perform common actions, such as saving a file and undo
Each cell is identified by a unique __________.
To delete the slide currently displayed in the Slide Pane:
A class of malicious code that "detonates" or goes off when a specified condition occurs.
_______ appear vertically and are identified by letters.
It is a unit of information equivalent to the result of a choice between only 2 possible alternatives in the binary number system.
Information is probably the biggest advantage internet is offering.
In which view Headers and Footers are visible
The only language which the computer understands is ______________
What are movements from one slide to another during a presentation called?
You can close a document which one of the following ways?
When creating a chart in Excel, what is the first thing you need to do?
What is the control center located below the title bar at the top of the Microsoft Word window called?
The Slide Master View is located on the __________ ribbon.
It is the largest network in the world that connects hundreds of thousands of individual networks all over the world.
The address of a World Wide Web page
Display information about the current document and process.
If I want to find an average of cells A1 through A25, which formula would I use?
It is weakness which allows an attacker to reduce a system's information assurance.
RAM stands for?
Display a snapchat of each slide.
Add the following unsigned binary numbers: 1111 and 0011.
Two or more users work with the computer at the same time
The intersection of a row and column.
Components of a network can be connected to each other differently in some fashion.
A ________ is a grid of rows and columns in which you enter text, numbers, and the results of calculations.
File is (or is not) a candidate for backup.
To print a presentation using shortcut keys, press ____.
It directs and controls the entire computer system and performs all arithmetic and logical operations.
It is a piece of software, a chunk of data, or sequence of commands that takes advantage of a software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerized).
This view displays your document as it will appear when printed and is best for working in documents with images.
Electronic transfer of data from one location to another.
A program that spreads copies of itself through a network.
These are effects that are in place when you switch from one slide to the next.
How do you switch between multiple document windows?
DOS command to make directory
It contains multiple tabs, each with several groups of commands. You will use these tabs to perform the most common tasks in Excel.
To select text means to ___________ a block of text.
It is the intersection of a row and a column
On an Excel sheet, the active cell is indicated by ____.
Combines multiple cells into one cell.
Executes all arithmetic and logical operations. Arithmetic calculations like as addition, subtraction, multiplication and division.
Designed to handle data communication for multiple organizations in a city and nearby cities as well.
Text-styling feature of MS word is
Add the following unsigned binary numbers: 101010 and 001111.
Two or more parts of the same process running at the same time.
To move a text placeholder, you:
Convert 10100011 from binary to decimal.
The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s ___________.
From an administrator’s point of view, a network can be private network which belong to a single autonomous system and cannot be accessed outside its physical or logical domain.
It is smallest network which is very personal to a user.
Changes the space between the cell border and its content
The core of the OS. Interacts with the BIOS (at one end), and the UI (at the other end).
The ________________ lets you access common commands no matter which tab is selected.
Each slide has an area where text and graphics are entered for a presentation.
The direction of a rectangular page for viewing and printing is called
What is the Quick Access Toolbar?
An electronic device, operating under the control of instructions stored in its own memory that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use
PowerPoint is best described as:
In an _________ range, all cells touch each other and form a rectangle.
The primary view that you use to write, edit, and design your presentation and is divided into three areas: Slides and notes pane
Computers should work without having unexpected problems
_______________ are designated by dotted lines; they appear on a slide as guides, but they will not appear on the finished presentation.
You can access many ‘chat rooms’ on the web that can be used to meet new people, make new friends, as well as to stay in touch with old friends.
The principle of ________________ specifies that only the sender and the intended recipient should be able to access the content of the message.
___________ is a permanent form of storage
_______________ mechanism helps in establishing proof of identification.
What year did admiral Grace Murray Hopper finds a moth among the relays of a Navy computer and calls it a “bug.”
Someone who seeks and exploits weaknesses in a computer system or computer network, “a clever programmer“.
A horizontal strip near the top of the window that contains tabs of grouped command buttons that you click to interact with the app
Convert : (110)2 = ( __ )10.
Add the following unsigned binary numbers: 0011 and 1101.
Convert 01000010 from binary to decimal.
The _____ begins with an equal sign (=).
What is the cell in the worksheet in which you can type data?
Contains buttons (icons) for common commands.
This determines how all the elements on a slide are arranged, including text and content placeholders
The binary equivalent of the decimal number 10 is __________
What is the default file extension for a document created in Word?
An operator is a symbol that indicates the type of calculation to perform on the operands, such as a plus sign (+) for addition.
Shows where text will appear when you begin typing.
Add the following unsigned binary numbers: 10110110 and 01100010.
Why the document you created at home displays with a different font at school?
What key can you press to get help in Word 2013?
File will not be displayed in normal list of files.
PowerPoint has a set of Master Slides available for every Design Theme. The three Masters include a Slide Master, Handout Master, and ______.
It is a battery or AC-powered personal computer that can be easily carried and used in a variety of locations.
What tab allows us to insert pictures?
It is often viewed as the act of sending unsolicited email. This multiple or vast emailing is often compared to mass junk mailings.
The cell in the worksheet in which you can type data is called the __________.
It is used to accomplish specific tasks other than just running the computer system.
Convert 11101111 from binary to decimal.
This is activated by default. This allows you to scroll down both windows at the same time.
DOS command to remove a directory or an entire directory tree.
A computer network spanned inside a building and operated under single administrative system is generally termed as __________________.
A ___________ in a computer system, is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected.
This is any peripheral (piece of computer hardware equipment to provide data and control signals to an information processing system such as a computer or other information appliance.
The _________ is a temporary storage place in the computer’s memory.
Web is a collection of files that reside on computers, called _____________, that are located all over the world and are connected to each other through the Internet.
What is the name assigned to a file when it is saved?
_______________ is an Internet utility software used to uploaded and download files.
Which of the following is the correct representation of a binary number?
Which of the following is NOT a new feature in Word 2013?
To save a new file or an existing file in its same storage location, which commonly used shortcut key or keyboard key combination is used?
A bit in a computer terminology means either 0 or 1.
The file used to store worksheets is called a ________.
To open a document, click the File tab and select ______
To store a new or existing file with the same name, which button is used?
Which key do you press to go into Slide Show view and always start on the first slide?
Excel refers to files as.
It is the largest network in existence on this planet.
It display the name of the open file.
Being responsible online includes: A) Keeping passwords a secret & being nice B) Telling an adult when I fell unsafe C) None of the above D) All of the above
They are known as crackers or dark-side hackers. Someone violating computer or Internet security maliciously or for illegal personal gain.
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
A Theme gives your slides a consistent appearance throughout your presentation.
Electronic messages sent over the Internet can be easily snooped and tracked, revealing who is talking to whom and what they are talking about.
Areas of the Ribbon that arrange commands based on their functions
A commercial organization with permanent connection to the Internet that sells temporary connections to subscribers.
It is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to data.
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectDriver Device
Computer System
Information Systems Operations and Maintenance
Computer Fundamentals
Bookkeeper and Clerk
Fundamentals of Database System
Database Management System
Object Oriented Programming Laboratory
Network Security
Mobile Programming
Management Information Systems
Mobile Application Design and Development
Mobile Application Design and Development 2
Managing Information and Technology
Mail and Web Services
Living in the Information Technology Era
Information Technology Capstone Project
Information Technology Practicum
Intro to Hardware Description Language
Introduction to Computing
Introduction to Multimedia
Introduction to Information Systems
Introduction to Human Computer
Internet Technology in Real Estate
Integrative Programming and Technology 2
Internet Marketing and Entrepreneurship
Information Security and Management
Information Assurance and Security 3
Information Assurance and Security 2
Fundamentals of Investigation and Intelligence
Digital Imaging
Data Structures and Algorithms
Data Communications and Networking 2
Data Communications and Networking
Cyber Security: Theories and Practice
Chemistry for Engineers
Auditing and Assurance Concepts and Applications
Animation Project
3D Game Art Development
Load Testing
Software Engineering
System Administration and Maintenance
Integrative Programming and Technology
Data Communications and Networking 4
Current Trends and Issues
Linux Administration
Computer Programming
Systems Integration and Architecture
Application Lifecycle Management
Data Communications and Networking 3
Information Assurance and Security
Principles of Operating System and its Application
Production Operations Management with Total Quality Management
Philippine Tourism Geography and Culture
Operation Management
Operations Auditing
Operations Management in the Tourism and Hospitality Industry
Multi Cultural Diversity in Workplace for the Tour
Micro Perspective of Tourism and Hospitality
Macro Perspective of Tourism and Hospitality
Legal Aspects in Tourism and Hospitality
Kitchen Essentials and Basic Food Preparation
International Issues for Human Resources Management
Human Resource Management
Entrepreneurship in Tourism and Hospitality
Compensation Administration
Introduction to Transport Services
Catering Management
Bread and Pastry
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts