Ctrl+f
Ctrl+D
Ctrl+L
Ctrl+1
Match the Cybersecurity Terms with Their Descriptions
1 → D, 2 → C, 3 → E, 4 → F
1 → A, 2 → B, 3 → D, 4 → E
1 → F, 2 → E, 3 → A, 4 → B
1 → B, 2 → D, 3 → F, 4 → C
Resins
Nintinol
Rubber
All the above
WAN
LAN
MAN
BAN
Multipurpose internet mail export
Multipurpose internet mail extensions
Multi internet mail extensions
None of these
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
The graphical interface of an operating system
The core part of the operating system that manages resources
A type of antivirus software
The hardware interface for external devices
Monitor
Keyboard
Printer
Speaker
Date
Time
Numerical
String
Control unit
Cache unit
Calculating unit
Communication unit
General User Interface
Graphical User Interface
Global User Interface
Guided User Interaction
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
.ods
.odt
.ott
.odf
Mouse
Scanner
Uniform Reset Locator
Uniform Resource Locator
Universal Resource Location
Ctrl+N
Ctrl+M
Ctrl+Q
Ctrl+P
Spell check it
Review it
Verify and validate it
Organise and simplify it
Ctrl + Shift + B
Ctrl + Shift + P
Ctrl + Shift + +
Mail Merge
Macros
Multiple Letter
Template
Single-click the boundary to the left to the column heading
Double click the boundary to the right of the column heading
Press Alt and single click anywhere in the column
All of above
Internal commands.
External commands.
Utility Programs.
Bootloader
Match the following Windows shortcut keys with their correct functions.
1-F, 2-D, 3-C, 4-E
1-B, 2-E, 3-D, 4-F
1-A, 2-B, 3-C, 4-D
1-D, 2-C, 3-B, 4-A
educational website
search ingine
social networking website
shopping website
Unified Payment Interface
Intermediate Payment Interface
Unified Pay Interface
Unified Peoples Interface
SRAM
EPROM
HDD
Information handling
Data sharing
Data distribution
Data processing
Recalculated formulas in all sheets
Update chart
Open Styles
Create a document template
Normal view
Web view
Slide view
Print Layout view
1KB
1MB
128 bytes
None of The Above
Giga byte
Mega byte
Meta byte
Kilo byte
Input device
Output device
Central Processing Unit
8
16
32
63
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
IEEE 802.5
IEEE 802.12
IEEE 802.11
IEEE 802.7
AutoFilter
Conditional formatting
Pivot tables
Data validation
Arrange the following memory types in the correct order from lowest to highest in speed and cost:
1️⃣ Hard Disk Drive (HDD)
2️⃣ Cache Memory
3️⃣ Registers
4️⃣ RAM (Random Access Memory)
5️⃣ Solid-State Drive (SSD)
1 → 4 → 5 → 2 → 3
4 → 2 → 3 → 5 → 1
3 → 2 → 4 → 5 → 1
1 → 5 → 4 → 2 → 3
A4
A5
Legal
Letter
Slide Layouts
Slide Transitions
Animation Effects
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
The number of users
The type of transmission medium
The frequency of failure
Unauthorized access
Match the following network protocols with their purposes.
A-1, B-2, C-3, D-4
A-2, B-3, C-1, D-4
A-3, B-4, C-2, D-1
A-4, B-1, C-3, D-2
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
J.V. Attansoff
Bill Gates
Simur Cray
Winton Serf
Esc key
Spacebar
Enter key
Mouse button
Inbox
Outbox
Sent Box
Receive box
Tab
Ctrl + Tab
Ctrl + Shift + Tab
Shift + Tab
Seek time + latency time
Seek time
Seek time - latency time
Latency time
first generation
Second generation
third generation
Fourth generation
Human error
Transcription error
Transposition error
Troubleshooting error
1.40 Mb
1.44 Gb
1.40 Gb
1.44 Mb