Charity Computer Based Test Updated on by forherorg No Comments on Computer Based Test /15 12 Read the question properly and select the correct answer. Thank you, your time has elapsed. Created by forherorg Computer Based Test This is to test your overall knowledge concerning the class. To begin, fill this form 1 / 15 1. Which type of cyber attack is commonly performed through emails? Trojans Worms Ransomware Phishing 2 / 15 2. If you share too much information on social media, what may you be at risk of? Identity theft Malware Ransomware Phishing 3 / 15 3. For maximum security, passwords should be made up of? Upper and lower case letters numbers and symbols A sequence of numbers or letters Memorable names and dates Lower case letters only 4 / 15 4. How do you open an existing document in Microsoft Word? File > Save As File > Print File > Open File > Close 5 / 15 5. Which of the following is an example of email etiquette? Using excessive exclamation marks Responding promptly to emails Sending emails without a subject line Including sensitive information in the email body 6 / 15 6. What is the purpose of saving a document in Microsoft Word? To store the document on your computer for future use To print the document To share the document with others To close the document 7 / 15 7. How do you change the line spacing in a Word document? By applying a different text color By adjusting the line spacing option in the Paragraph group By adjusting the margin size By changing the font style 8 / 15 8. What does "CC" stand for in email communication? Confidential Copy Computer Communication Carbon Copy Copy Communication 9 / 15 9. Which shortcut key combination is used to open a new document in Microsoft Word? Ctrl + S Ctrl + N Ctrl + O Ctrl + P 10 / 15 10. How do you resize an image in Microsoft Word? Click and drag the image's corners Right-click the image and select "Resize" Use the "Size" options in the Format tab All of the above 11 / 15 11. What is the purpose of the "BCC" field in an email? To encrypt the email To mark the email as urgent To send a copy of the email to multiple recipients To hide recipients from each other 12 / 15 12. How to protect your personal Security? Always open your computer when you leave your desk Delete cookies weekly Update your anti-virus only once in a few years Show your password to Media Social 13 / 15 13. How do you create a bulleted list in Microsoft Word? Home > Bullets Format > Bullets Insert > Bullets Layout > Bullets 14 / 15 14. What term is used for unsolicited and often unwanted email messages? Trash Spam Inbox Archive 15 / 15 15. What is the purpose of using bulleted and numbered lists in Microsoft Word? To make text bold and italicized To organize information in a structured format To change the font style To insert images into a document Your score is 0% Restart quiz
0 Charity The mental health and menstrual health status of girls must not be underrated. by forherorg
0 Charity Girls’ education, empowerment, and enlightenment must be holistic. This is more so, because she is special. by forherorg