1) When the date and closing begin at the center, the
a) block style letter style is __________.
2) In business reports, supplementary information that
a) table of contents supports the statements in the body of the report is often located in the __________.
3) The __________ of a document is the layout of the
a) View page or what the page looks like.
4) The value used by the word processor when it is NOT a) page justification instructed to use any other is called the __________.
5) To insert the name of a document, use the __________ a) header and footer command. 6) To align text with both margins, use the __________
a) right alignment feature. 7) A collection of formats to be associated with various
a) style parts of a document, such as different heading levels, are called __________.
8) To print a character below the usual text line, use the
a) Superscript
__________.
a) setting tabs.
9) Common formatting features include all of the following EXCEPT
10) Times New Roman is an example of a __________.
a) Point
11) In formatting a document, which of the following
a) Point size refers to style?
12) Which one of the followings features does NOT apply a) Capitalizes 1st letter of sentence to AutoCorrect or Quick Correct?
13) Typefaces that have small lines at the ends of characters are
a) Boldface referred to as __________.
14) To distribute text equally between the top and bottom
a) center horizontal margins, choose the __________ feature. alignment 15) When a first line of a paragraph aligns at the left margin and
a) hanging indent the rest of the lines of the paragraph are indented, this is referred to as __________.
16) To widen a column in a spreadsheet, use the
a) tab key
__________.
b) AMS style
c) modified block style
d) closed block style
b) bibliography
c) appendix
d) index
b) format
c) style
d) wizard
b) style
c) layout
d) default setting
b) insert
c) format
d) style
b) left alignment
c) centered alignment
b) macros
c) templates
d) justified or full alignment d) headers and footers
b) subscript
c) style script
d) emboss script
b) placing text in columns. b) font style
b) Alignment
c) inserting headers and footers. c) font face
c) Helvetica
d) undo and repeat.
b) Arranges text in columns b) italic
c) Creates some fractions
d) Creates ordinal numbers d) sans serif
b) center justification
c) proportional spacing
b) first-line indent
c) proportional indent
b) border dialog box
d) mouse pointer on the right edge of the first cell
17) Unless specified otherwise, text entered into a spreadsheet is positioned as
18) To center a title across the top of a worksheet, what function is used?
19) The first step in changing the font and size in a worksheet is to
a) left justified.
b) right justified.
c) mouse pointer on the right edge of the column letter above the first row
c) centered vertically.
a) Centered
b) Indented c
c) Wrapped
d) Merge and center
a) choose the Format menu. b) choose the Tools menu.
c) highlight the cells you want to change.
d) choose the font and size from the toolbar.
c) serifs
d) styles
d) Bold
d) center vertical alignment d) second-line indent
d) centered horizontally.
2001 Computer Applications
20) How is the color of cells changed in a worksheet?
21) __________ affects the way data is shown in a cell.
22) In a worksheet, the default format that displays both text and numerical data as keyed is referred to as
__________.
23) The __________ field property specifies whether you must enter a value in the field.
24) When the format of the text on slides is predetermined so that the layout, color scheme, font, and style are consistent, a __________ is used.
25) What term describes cutting off portions of a graphic?
26) A __________ is a ghost image that appears behind the printed text on each page of the document.
27) Which of the following options is NOT available in adding borders to a document?
28) The default line
Related Documents: Computer Applications Test Essay
SUPREME COURT OF INDIA F.6/2014/Sr. P.A. & P.A./SCA(I) New Delhi, dated 10 May, 2014. ADVERTISEMENT Applications in the prescribed form are invited from Indian Citizens who fulfill the following essential qualifications as on 1.5.2014 for preparation of panel for appointment to the posts of Senior Personal Assistant in the Pay Band of Rs. 9300-34800/- with grade pay of Rs. 4600/- and Personal Assistant in the Pay Band of Rs. 9300-34800/with grade pay of Rs. 4200/- plus usual allowances as…
cases, the client may design manual procedures to test the completeness and accuracy of transactions processed by the computer. If user controls exist, the auditor can test the controls directly, similar to testing other human controls. 2. Planning for a low control risk assessment based on application controls. Many auditors take advantage of automated controls and plan strategies for assessing control risk at a low level based on computer application controls. 3. Planning for a high control risk…
515-6782 Office: 2209 NTAB (NE Campus) Course Outcomes 1. Become familiar with commonly used computer industry terminology 2. Learn about computer concepts including the system unit, input/output devices and storage, system software, the internet and the World Wide Web. 3. Review basic features of the Windows 7 interface including file management 4. Develop basic computer software skills by creating documents and presentations in the popular Microsoft Office Professional suite…
group may develop test cases and QA reviews the tests protocols. Typically validation is cross functional team activity with team members from all functions that are affected by the computer system. Persons who are responsible for the entire validation or specific tasks should be qualified for the assigned tasks. The qualification should be documented. For example, if a QA person develops test cases he/she should have a good understanding of the computer system and of the application. The person who…
Boston. With more than 15,000 fulltime employees and 2000 part time employees overall, speeded across the Cuddle Hospital Network with a total $0.93 billion patient revenue as per the fiscal year 2014. The Solution A web based application (portal and mobile device application) with an integration all the departments interconnected with each other sharing a common database for all the activities from the patient registration to operation management and final billing. Everyone will be having their respective…
Succeed in CISS 1310 Online (Current Concepts of Information and Computer Technology) Welcome to CISS 1310! During the course of this semester you will be exposed to many concepts associated with computer information systems and will have the opportunity to consider how information and computer technology relate to the world you live in now and in the future. CISS 1310 also covers the essential features of Microsoft applications, with the goal of preparing you to be competent with Internet Explorer…
One of the defining traits of today’s society is the increasing dependency on computer technology (CT). Its remarkable effects on all aspect of economic and social life allowed individuals from all corners of the world to be able to have access and transmit information at unimaginable speed. Thus inter-relating users create a virtual network that introduces our society to the near future. One of the many outcomes that theorists have noted is the shift from individual communities to “the global…
to boot 2) It takes a long time to load applications 3) Internet access is slow 4) On screen message indicates that the hard disk is almost full 5) Anti-Virus software reports a virus that can’t be removed 6) Frequent BSOD 7) The machine hangs when multitasking is attempted Task 6a - Create a short report outlining the current problems, including an analysis of the current specifications. The computer that employees are using seems to be a very old computer and theses problems could have many reason…
Penetration Testing ABSTRACT Penetration testing has been well popularized by the media. Many companies are now offering penetration services to identify vulnerabilities in systems and the surrounding processes. This report will Discuss "Penetration Testing" as a means of strengthening a corporate network's security. This report is divided into three parts. Introduction will give you a brief and basic overview of Penetration Testing and why we need Penetration Testing, The second part is the…
To create and edit a GPO, use the Group Policy Management Console (GPMC). By using the GPMC to link a GPO to selected Active Directory sites, domains, and organizational units (OUs), you apply the policy settings in the GPO to the users and computers in those Active Directory objects. An OU is the lowest-level Active Directory container to which you can assign Group Policy settings. You need a clear understanding of your organization’s business needs, to guide your Group Policy design. By analyzing…