81
Existing Excel charts can be edited by pressing which of the following key?
A.
B.
C.
D.
Answer & Solution
In Microsoft Excel, pressing F2
allows you to edit the selected cell or an existing chart. When editing
a chart, you can modify its data or design.
F1 is used to open help.
F3 is used to paste a defined name.
F4 repeats the last action, but it is not used for editing charts directly.
82
Which of the following expresses the elaboration of VIRUS?
A.
B.
C.
D.
Answer & Solution
The term VIRUS is
often believed to stand for Vital Information Resource
under Seize. However, this is a backronym, meaning it was
created after the fact, as the term "virus" itself originates from
the biological concept of a virus that infects and spreads.
83
Computer Virus is a type of ________________?
A.
B.
C.
D.
Answer & Solution
A computer virus
is a type of software designed to replicate
itself and spread to other computers, often causing harm or unwanted behavior
in the process. It is not hardware, a microorganism, or a non-living cell, but
malicious software that can disrupt or damage computer systems.
84
Antivirus is a type of ___________ ?
A.
B.
C.
D.
Answer & Solution
Antivirus is a type of utility
software. It is designed to detect, prevent, and remove malicious software
(viruses, malware) from a computer. Utility software helps maintain the health
and performance of a computer system.
System software refers to software
that manages and operates the hardware of a computer, such as operating
systems.
Application software is designed to
help users perform specific tasks (e.g., word processors, browsers).
Publishing software is used for
creating printed materials, such as brochures, magazines, and books.
85
Which of the following is not antivirus software?
A.
B.
C.
D.
Answer & Solution
Oracle is a company known for its
database management systems and enterprise software solutions, not antivirus
software.
Avira, Kaspersky, and e-scan
are all well-known antivirus software programs used to detect and
protect against viruses and other types of malware.
86
Which of the following is not application software?
A.
B.
C.
D.
Answer & Solution
System Software are Macintosh, DOS, Unix, Windows.
87
A megabyte is actually equal to __________ kilobytes?
A.
B.
C.
D.
Answer & Solution
A megabyte (MB) is traditionally equal to 1,024 kilobytes (KB) in the binary system used by computers. This is based on powers of 2, where 1 MB = 2^10 KB = 1,024 KB.
1,000 KB is sometimes used in the decimal system (based on powers of 10), but the correct and commonly accepted definition in computing is 1,024 KB.
88
In MS Word, pressing F8 key for three times selects __________ .
A.
B.
C.
D.
Answer & Solution
In MS Word, pressing the F8 key three times in succession selects a sentence. Here’s how it works:Pressing F8 once selects a word. Pressing F8 twice selects a paragraph.
In MS Word, pressing the F8 key three times in succession selects a sentence. Here’s how it works:
Pressing F8 once selects a word.
Pressing F8 twice selects a paragraph.
Pressing F8 three times selects a sentence.
Pressing F8 three times selects a sentence.
89
Which of the following data structures can be used both as Stack and Queue?
A.
B.
C.
D.
Answer & Solution
A Deque (Double-Ended Queue)
is a data structure that allows elements to be added or removed from both ends,
making it versatile. It can be used as both a stack
(LIFO: Last In, First Out) and a queue (FIFO:
First In, First Out), depending on how elements are inserted and removed.
90
Which of the following device take data sent from one network device and forward to the destination node based on MAC address?
A.
B.
C.
D.
Answer & Solution
A switch is a network device
that operates at the data link layer (Layer 2) of the OSI model. It
forwards data between devices within a local area network (LAN) based on MAC
addresses. When a device sends data to another device on the same network,
the switch uses the destination MAC address to forward the data to the correct
node.
A gateway is used to connect different networks (often different types of networks) and operates at the network layer or above, not based on MAC addresses.
A hub is a basic network device that broadcasts data to all connected devices; it does not direct traffic based on MAC addresses.
A router operates at the network
layer (Layer 3) and forwards data based on IP addresses, not MAC
addresses.
