This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 121651. |
Range of 0, 1, 2, 3 …………… , 9 is ……………. A) 0 B) 9 C ) 12 D) 13 |
|
Answer» Correct option is B) 9 |
|
| 121652. |
Mode of 1, 2, 2, 3, 3, 3 is …………….. A) 1 B) 2 C) 3D) None |
|
Answer» Correct option is C) 3 |
|
| 121653. |
AM of 1, 2, 3, 4 is A) 4 B) 6 C) 9 D) None |
|
Answer» Correct option is D) None |
|
| 121654. |
Median of 1/5 ,1/2 ,1/6 ,1/4 ,1/3 is ……………. A) 1 B) 2 C) 3 D) None |
|
Answer» Correct option is D) None |
|
| 121655. |
Mid value of 24 – 28 is ………………. A) 13 B) 23 C) 16 D) 26 |
|
Answer» Correct option is D) 26 |
|
| 121656. |
Mid value of class 60-100 is ……………. A) 120 B) 100 C) 30 D) 80 |
|
Answer» Correct option is D) 80 |
|
| 121657. |
Range of 1, 2, 3 …………… 10 = ………….. A) 9 B) 10 C) 8 D) 32 |
|
Answer» Correct option is A) 9 |
|
| 121658. |
निम्नांकित संख्या-युग्मों के ऐसे समापवर्त्य ज्ञात कीजिए जिनका मान 80 से कम हो।(क) 9 और 15(ख) 6 और 10(ग) 8 और 9(घ) 7 और 11 |
|
Answer» (क) 9 = 9, 18, 27, 36, 45, 54, 63, 72 15 = 15, 30, 45, 60, 75 अतः 9 और 15 का समापवर्त्य जो 80 से कम हो = 45 (ख) 6 = 6, 12, 18, 24, 30, 36, 42, 48, 54, 60, 66, 72, 78 10 = 10, 20, 30, 40, 50, 60, 70 अतः 6 और 10 का समापवर्त्य जो 80 से कम हो = 30, 60 (ग) 8 = 8, 16, 24, 32, 40, 48, 56, 64, 72 9 = 9, 18, 27, 36, 45, 54, 63, 72 अतः 8 और 9 का समापवर्त्य जो 80 से कम हो = 72 (घ) 7 = 7, 14, 21, 28, 35, 42, 49, 56, 63, 70, 77 11 = 11, 22, 33, 44, 55, 66, 77 अंतः 7 और 11 का समापवर्त्य जो 80 से कम हो = 77 |
|
| 121659. |
Find the mean of the data; 10.25, 9, 4.75, 8, 2.65, 12, 2.35 |
|
Answer» A.M. = Sum of the observations / Number of the observations \(\overline {X}\) = \(\cfrac{\sum X_i}{N}\) = \(\cfrac{10.25\,+\,9\,+\,4.75\,+8 \,+\,2.65\,+\,12\,+2.35}{7}\) = \(\cfrac{49}{7}\) \(\overline {X}\) = 7 |
|
| 121660. |
65 is the mid value of ……………….A) 70-80B) 60-100C) 60-70D) 60-80 |
|
Answer» Correct option is C) 60-70 |
|
| 121661. |
In a data AM of 7 items is 32 and for this data an item 48 is added then the result of AM = …………….A) 70 B) 40 C) 34 D) 43 |
|
Answer» Correct option is C) 34 |
|
| 121662. |
Find: i) \(\frac{7}{11}\) of 330 ii) \(\frac{5}{9}\) of 108 iii) \(\frac{2}{7}\) of 16 iv) \(\frac{1}{7}\) of \(\frac{3}{10}\) |
|
Answer» i) \(\frac{7}{11}\) of 330 = \(\frac{7}{11}\) × 330 = \(\frac{7}{11}\) × 11 × 30 = 7 × 30 = 210 ii) \(\frac{5}{9}\) of 108 = \(\frac{5}{9}\) × 108 = \(\frac{5}{9}\) × 9 × 12 = 5 × 12 = 60 iii) \(\frac{2}{7}\) of 16 = \(\frac{2}{7}\) × 16 = \(\frac{2\times16}{7}\) = \(\frac{32}{7}\) or \(4\frac{4}{7}\) iv) \(\frac{1}{7}\) of \(\frac{3}{10}\) = \(\frac{1}{7}\) × \(\frac{3}{10}\) = \(\frac{1\times3}{7\times10}\) = \(\frac{3}{70}\) |
|
| 121663. |
Odd one out (a) cyber terrorism (b) Attacks against e-Governance websites (c) Impersonation and cheating (d) Website defacement |
|
Answer» (c) Impersonation and cheating, it is cyber crime against individual others are cyber crimes against Government |
|
| 121664. |
A ……. is a software program that is designed to copy itself from one computer to another, without human intervention.(a) trojan(b) vims(c) worm(d) spam |
|
Answer» (c) A worm is a self-replicating software program. It does not require another program to host it. |
|
| 121665. |
AM of 94, 85, 59, 62, 65, 70, 68, 72 is …………….. A) 65.7 B) 85.1 C) 71.8 D) 79 |
|
Answer» Correct option is C) 71.8 |
|
| 121666. |
Odd one out (a) Identity theft (b) Harassment (c) voilation of privacy (d) credit card fraud |
|
Answer» (d) credit card fraud, it is a cyber crime against individual others are cyber crimes against property |
|
| 121667. |
A …….. is a virus that is often disguised as a useful computer program.(a) trojan horse(b) hacker(c) worm(d) spam |
|
Answer» (a) Trojan horse is a virus, i.e. often disguised as a useful computer program. |
|
| 121668. |
Adware is a ‘Software that posts unwanted advertisements on your computer. |
|
Answer» True Adware is a software that is given to the user with unwanted advertisements embedded in the application. |
|
| 121669. |
Odd one out (а) Identity theft (b) Harassment (c) violation of privacy (d) credit card fraud |
|
Answer» (d) credit card fraud, it is a cybercrime against individual others are cyber crimes against property. |
|
| 121670. |
What can you do if you want each slide should be shown for a specific amount of time? |
|
Answer» Setting advance slide to one mouse click is the default and a simple setting. If you want each slide to be shown for a specific amount of time, click automatically after and enter the number of seconds. Click Apply to All slides. |
|
| 121671. |
Find out the mode of the following marks obtained by 15 students in a class: Marks : 4 , 6 , 5 , 7 , 9 , 8 , 10 , 4 , 7 , 6 , 5 , 9 , 8 , 7 , 7. |
||||||||||||||||
|
Answer» Mode is the value which occurs most frequently in a set of observations.
Frequency of given set of observations are: Here, we can see that 7 occurred most frequently. So, Mode = 7 |
|||||||||||||||||
| 121672. |
Phishing, hacking, denial of service attacks, etc are ........ crimes. |
|
Answer» Phishing, hacking, denial of service attacks, etc are Cyber crime. |
|
| 121673. |
Unlike a computer virus, a ……….. can replicate itself automatically. |
|
Answer» Unlike a computer virus, a worm can replicate itself automatically. |
|
| 121674. |
A virus may corrupt or delete data on your computer. |
|
Answer» True A virus may corrupt or delete data on your computer. |
|
| 121675. |
Phishing, hacking, denial of service attacks, etc are ____ crimes. |
|
Answer» Phishing, hacking, denial of service attacks, etc are Cyber crimes. |
|
| 121676. |
………… is the general term to refer to infectious software such as virus, worm, spyware etc. |
|
Answer» Malware is the general term to refer to infectious software such as a virus, worm, spyware etc. |
|
| 121677. |
A good way to safeguard access to your computer is to protect it.(a) Deadbolt(b) Copyright(c) Safemode(d) Password |
|
Answer» (d) Password is a good way to safeguard access to your computer to protect it. |
|
| 121678. |
Name some forms of virus attacks. |
|
Answer» Worms, Trojan horse, Computer Virus etc. |
|
| 121679. |
Which of the following is not a symptom of a virus attack?(a) The computer begins to run slowly(b) Unusual messages and graphics appear on the screen for inexplicable reasons(c) Some programs or data files on the computer either become corrupt or are difficult to locate(d) Your data is copied to another location |
|
Answer» (d) Your data is copied to another location is not a symptom of a virus attack. |
|
| 121680. |
After modifying a document using track changes, in how many ways a document can be viewed? |
|
Answer» There are four ways of viewing a document as follows: 1. Final Showing Markup 2. Final 3. Original Showing Markup 4. Original |
|
| 121681. |
Which of the following is not an Autoshape? (a) Line (b) Circle (c) Curve (d) ClipArt |
|
Answer» (d) ClipArt is not an Autosha-pe, because it is not found under Shapes. |
|
| 121682. |
Which of the following option is used to control the Automatic formatting that the user wants? (a) Replace text As You Type (b) AutoFormat As You Type (c) Proofing (d) Track changes |
|
Answer» (b) For turning Automatic formatting On or Off, AutoFormat As You Type tab under Proofing is used. |
|
| 121683. |
Write differences between online backup and offline backup. |
||||||
|
Answer» Differences between online backup and offline backup are as follows:
|
|||||||
| 121684. |
What are the common symptoms of a virus attack? |
|
Answer» Symptoms of Computer Viruses Attack The list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows: 1. Odd messages are displaying on the screen. 2. Some files are missing. 3. System runs slower. 4. PC (Personal Computer) crash or restart again and again. 5. Drives are not accessible. 6. Antivirus software will not run or installed. 7. Unexpected sound or music plays. 8. The mouse pointer changes its graphic. 9. Receive strange E-mails containing odd attachments or viruses. 10. PC starts performing functions like opening or closing windows, running programs on its own. |
|
| 121685. |
Which tab of MS-Word contains the Shapes option?(a) Home (b) Review (c) Insert (d) Mailings |
|
Answer» (c) Insert tab of MS-Word contains the Shapes option, |
|
| 121686. |
Explain denial of service attack. |
|
Answer» A denial of service attack is a type of attack that consumes all the resources of a computer. |
|
| 121687. |
What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? |
|
Answer» Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them. |
|
| 121688. |
Which feature is used to monitor all document changes? (a) Edit document (b) Monitor change (c) Track changes (d) Track all |
|
Answer» c) Track changes tool is used when a document is edited or reviewed by many people. |
|
| 121689. |
Which of the following feature is used to arrange the records in a data source before merging? (a) Filter (b) Sort (c) Auto Check for Errors (d) Match Fields |
|
Answer» (b) Sort feature is used to arrange the records in a data source before merging. |
|
| 121690. |
The refers to the database that stores the information related to the name and address of the recipients. (a) Main document (b) Merged document (c) Data source (d) Comments |
|
Answer» (c) Data source is used to store the recipient’s information related to name and address while using mail merge. |
|
| 121691. |
While performing Mail Merge, in how many ways can you select recipients? Explain any one of them. |
|
Answer» When you open or create a data source by using the Mail Merge wizard, you are telling Word to use a specific set of variable information for your merge. Use one of the following methods to attach the main document to the data source (or Select recipients): Method 1: Use an Existing Data Source To use an existing data source, do the following: 1. In the Mail Merge task pane, click Use an existing list. 2. In the Use an existing list section, click Browse. 3. Select Data Source dialog box will appear. 4. In this dialog box, select the file that contains the variable information that you want to use and then, click Open button. If the data source is not listed in the list of files, select the appropriate drive and folder. If necessary, select the appropriate option in the All Data Sources list. Select the file and then, click Open. MS-Word displays the Mail Merge Recipients dialog box. You can sort and edit your data if you want. 5. Click OK to return to the main document. 6. Save the main document. When you save the main document at this point, you are also saving the data source and attaching the data source to the main document. 7. Type the name that you want to give to your main document and then, click Save button. Method 2: Use Names from a Microsoft Outlook Contacts List To use an Outlook Contact List, do the following: 1. In the Mail Merge task pane, click Select from Outlook contacts. 2. In the Select from Outlook contacts section, click Choose Contacts Folder. 3. When the Select Contacts dialog box will be appear, select the Outlook contacts folder that you want and then, click OK button. Note: Word displays the Mail Merge Recipients dialog box. You can sort and edit your data if you want. 4. Click OK to return to the main document. Method 3: Database of Names and Addresses To create a new database, do the following: 1. In the Mail Merge task pane, click on Type a new list. 2. In the Type a new list section, click Create… . The New Address List dialog box will appear. In this dialog box, enter the address information for each record. If there is no information for a particular field leave the box blank. By default, Word skips blank fields. Therefore, the merge is not affected, if blank entries are in the data form. The set of information in each form makes up one data record. 3. After you type the one full information for a record, click New Entry to move to the next record. To delete a record, click Delete Entry. To search for a specific record, click Find… . To customise your list, click Customize Columns… . In Customize Address List dialog box, you can add, delete, rename and reorder the merge fields. 4. Now, click OK button. Save Address List dialog box will appear. In this dialog box, type the name that you want to give to your data source in the File name box and then, click Save button. 5. Mail Merge Recipients dialog box will appear. In this dialog box, make any changes that you want and then, click OK. 6. Type the name that you want to give to your main document and then click Save button. To proceed to the next step, click Next: Write your letter to finish setting up your letter. When you save the main document at this point, you are also saving the data source and attaching the data source to the main document. |
|
| 121692. |
……………….. are collections of information for individual items. |
|
Answer» Records are collections of information for individual items. |
|
| 121693. |
The ………………… feature allows you to highlight and view changes made to a document. |
|
Answer» The Track Changes feature allows you to highlight and view changes made to a document. |
|
| 121694. |
Press and hold ……………….. of mouse while dragging for drawing a shape. |
|
Answer» Press and hold left button of mouse while dragging for drawing a shape. |
|
| 121695. |
Home tab of MS-Word contains the Object option. |
|
Answer» False Insert tab of MS-Word contains the Object option |
|
| 121696. |
………………… is a tool in MS-Word using which customized letters, mailing labels and envelopes can be printed in bulk. |
|
Answer» Mail Merge is a tool in MS-Word using which customized letters, mailing labels and envelopes can be printed in bulk. |
|
| 121697. |
What is the name of the column heading for each category in a data source? (a) Data field (b) Field (c) Field name (d) Record |
|
Answer» (c) Field name is the name of the column heading for each category in a data source. |
|
| 121698. |
You cannot insert ………………… into a main document until after the data source has been created in Word. |
|
Answer» You cannot insert fields into a main document until after the data source has been created in Word. |
|
| 121699. |
The information that remains the same for each version of the mail merged document in MS-Word is known as ………………… |
|
Answer» The information that remains the same for each version of the mail merged document in MS-Word is known as Data source |
|
| 121700. |
You cannot insert Mathematical symbols into a Word document. |
|
Answer» False Word 2007 allows insertion of mathematical symbols into equation. |
|