Page 124 - modular_v2.0_HTML&_CSS_Fb
P. 124
13. If a student wants to maintain a reference to cell A1 when copying a formula across multiple cells, which notation
should they use?
(a) A1 (b) $A$1 (c) A$1 (d) $A1
14. If a student needs to find the corresponding price for a product listed in cell A2 from a price list in another table,
which function should they use?
(a) VLOOKUP (b) INDEX (c) HLOOKUP (d) MATCH
15. When entering data into Excel, which of the following is considered a text data type?
(a) 12345 (b) =SUM(A1:A10) (c) 45.67 (d) "Hello World"
16. If a website’s domain name is “example.org”, which part of this name represents the top level domain (TLD)?
(a) example (b) www (c) .org (d) example.org
17. In a nested conditional structure, which condition is checked first?
(a) The innermost condition (b) Conditions are not checked in any order
(c) Random conditions (d) The outermost condition
18. Which of the following is the correct order of function execution?
(a) Declaration → Definition → Call (b) Call → Declaration → Definition
(c) Definition → Call → Declaration (d) Declaration → Call → Definition
19. What is the default margin setting for the top and bottom margins in a Word document?
(a) 1.54 cm (b) 2.54 cm
(c) 2.0 cm (d) 0.8 cm
20. Which of the following features allows you to create a preformatted document layout?
(a) Themes (b) Styles
(c) Templates (d) Page Layout
Section C
(Each question has four choices (a), (b), (c) and (d), out of which TWO are correct.)
21. Which of the following ways can be used to insert comments in PowerPoint?
(a) Review → New Comment
(b) Left-click on the slide and choose “Insert Comment”
(c) Insert Tab → Comment
(d) View Tab → Notes
22. Which two options can be used to change the background colour of a cell?
(a) Home > Fill Color (b) Right-click > Format Cells > Fill tab
(c) Ctrl + N (d) Style> color
23. Which two Internet protocols are necessary for secure data transfer between a web server and a web browser?
(a) FTP and HTTP (b) HTTP and IP (c) HTTP and HTTPS (d) HTTPS and SSL
24. Which malware types can negatively impact data security by encrypting user files or taking control of the screen,
thereby restricting data access?
(a) Trojan Horse (b) Adware (c) Ransomware (d) Worm
25. In an organisation, with a number of _______ at far off places, networking facilitates cheap and easy mode of _______ .
(a) Houses (b) Personal meeting
(c) Branches (d) Communication
Answers
1. (c) 2. (a) 3. (d) 4. (c) 5. (b)
6. (c) 7. (b) 8. (c) 9. (c) 10. (c)
11. (b) 12. (b) 13. (b) 14. (a) 15. (d)
16. (c) 17. (d) 18. (a) 19. (b) 20. (c)
21. (a), (c) 22. (a), (b) 23. (c), (d) 24. (c), (d) 25. (c), (d)
122
Touchpad MODULAR (Ver. 2.0)

