Page 92 - PlusGPT_V2.1_C7_Flipbook
P. 92
Test Sheet 2 (Based on chapters 4 to 6)
A. Tick (✓) the correct option.
1. Why do hackers break into the other’s computer system?.
(i) To steal important data (ii) To destroy the system
(iii) Both (i) and (ii) (iv) None of these
2. are virtual diaries created by people to share their hobbies, thoughts with
like-minded people.
(i) E-learning (ii) Blog
(iii) E-mail (iv) None of these
3. When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
not to be trusted. It is called .
(i) Spamming (ii) E-mail spoofing
(iii) Phishing (iv) None of these
4. What are the vertical divisions known as?
(i) Grid (ii) Columns
(iii) Worksheet (iv) Row
5. You can specify a column width of 0 to .
(i) 255 (ii) 256
(iii) 409 (iv) 410
6. We can edit the content of a cell by on it.
(i) Right-clicking (ii) Double-clicking
(iii) Clicking (iv) Pressing F2
7. Which of the following functions is used to calculate the average of a range of values?
(i) AVERAGE (ii) SUM
(iii) AVG (iv) INT
8. What is a group of selected cells called?
(i) Selection (ii) Combination
(iii) Cell range (iv) Cell reference
90 Premium Edition-VII

