Word
EXCEL
PowerPt
CyberSecurity
Pro Roles
100

Which tab on the ribbon allows you to change the font and font size?

  •        A. Insert
  •        B. Design
  •        C. Home
  •        D. View

Home

100

Which symbol is used to start a formula in Excel?

  • A.     =
  • B.     +
  • C.     @
  • D.     #
  • A.     =
100

Which tab do you use to add a new slide?

  • A. File
  • B. Insert
  • C. Home
  • D. Design
  • C. Home
100

Which of the following is the strongest password?

  • A. password123
  • B. ilovecats
  • C. $3cUr3!P@55w0rd
  • D. qwerty
  • C. $3cUr3!P@55w0rd
100

Which I.T. role is primarily responsible for maintaining network hardware and software?

  • A. Software Developer
  • B. Network Administrator
  • C. Data Analyst
  • D. Help Desk Technician
  • B. Network Administrator
200

What is the shortcut to copy selected text in Word?

  • A. Ctrl + X
  • B. Ctrl + V
  • C. Ctrl + Z
  • D. Ctrl + C

Ctrl + C

200

What function adds a range of cells?

  • A. AVG
  • B. SUM
  • C. ADD
  • D. COUNT
  • B. SUM
200

What view lets you see and arrange all your slides at once?

  • A. Slide Sorter
  • B. Normal
  • C. Notes Page
  • D. Reading View
  • A. Slide Sorter
200

What is the purpose of a firewall?

  • A. Increase internet speed
  • B. Block spam emails
  • C. Monitor and control incoming and outgoing network traffic
  • D. Improve screen resolution
  • C. Monitor and control incoming and outgoing network traffic
200

Who is responsible for writing and testing computer programs?

  • A. Network Engineer
  • B. System Administrator
  • C. Software Developer
  • D. IT Support
  • C. Software Developer
300

What feature helps correct spelling and grammar errors in Word?

  • A. Editor
  • B. Comments
  • C. Review Tracker
  • D. Insights

Editor

300

Which of the following is a valid cell reference?

  • A. 1A
  • B. A1
  • C. AA
  • D. A$
  • B. A1
300

Which feature allows you to apply consistent formatting across all slides?

  • A. Slide Layout
  • B. Slide Sorter
  • C. Slide Master
  • D. Slide Show
  • C. Slide Master
300

Which of the following is a recommended security practice for Wi-Fi networks?

  • A. Use WEP encryption
  • B. Disable encryption
  • C. Use WPA3 encryption
  • D. Leave the network open
  • C. Use WPA3 encryption
300

What is the main role of a Help Desk Technician?

  • A. Create websites
  • B. Manage servers
  • C. Assist users with technical problems
  • D. Develop software
  • C. Assist users with technical problems
400

Which file format is the default for saving documents in Word 365?

  • A. .txt
  • B. .doc
  • C. .pdf
  • D. .docx

.docx (D)

400

How do you make a cell reference absolute in a formula?

  • A. Use brackets [ ]
  • B. Add a dollar sign $
  • C. Use an asterisk *
  • D. Use quotation marks " "
  • B. Add a dollar sign $
400

How do you start a slideshow from the beginning?

  • A. F10
  • B. F5
  • C. Ctrl + S
  • D. Alt + Shift
  • B. F5
400

What should you do before clicking on a link in an email?

  • A. Forward it to friends
  • B. Verify the sender and hover over the link
  • C. Open it immediately
  • D. Report it to your ISP
  • B. Verify the sender and hover over the link
400

Which professional secures systems from cyber threats and data breaches?

  • A. Cybersecurity Specialist
  • B. Web Developer
  • C. Database Administrator
  • D. Data Analyst
  • A. Cybersecurity Specialist
500

How can you insert page numbers into a Word document?

  • A. Insert > Header
  • B. Layout > Page Setup
  • C. Insert > Page Number
  • D. View > Navigation Pane
  • C. Insert > Page Number
500

Which feature helps visualize data in a graphical format?

  • A. Table
  • B. Pivot Table
  • C. Chart
  • D. Filter
  • C. Chart
500

What type of file is the default when saving a PowerPoint presentation?

  • A. .ppt
  • B. .pdf
  • C. .pptx
  • D. .docx
  • C. .pptx
500

Which type of software helps detect and prevent malicious programs?

  • A. Driver updater
  • B. Antivirus
  • C. Screen saver
  • D. Disk defragmenter
  • B. Antivirus
500

Who is responsible for managing databases and ensuring data is stored securely and efficiently?

  • A. Data Entry Clerk
  • B. Network Administrator
  • C. Database Administrator
  • D. System Architect
  • C. Database Administrator
600

What is the function of the 'Track Changes' feature?

  • A. Reverts the document to an earlier version
  • B. Displays recent changes to a document
  • C. Allows multiple users to comment
  • D. Highlights and logs edits for review
  • D. Highlights and logs edits for review
600

What does the Fill Handle allow you to do?

  • A. Fill in the background color
  • B. Drag formulas or values to other cells
  • C. Format cells
  • D. Create charts
  • B. Drag formulas or values to other cells
600

Which tab would you use to insert a chart or SmartArt graphic?

  • A. Review
  • B. Design
  • C. Insert
  • D. Slide Show
  • C. Insert
600

What is two-factor authentication (2FA)?

  • A. A way to log in with only your username
  • B. Logging in twice
  • C. Using a password plus a second form of verification
  • D. A backup password system
  • C. Using a password plus a second form of verification
600

What is a key duty of a System Administrator?

  • A. Create apps
  • B. Manage and configure servers and operating systems
  • C. Design network cables
  • D. Assist customers on phone calls
  • B. Manage and configure servers and operating systems
700

Which of the following lets you apply consistent formatting throughout your document?

  • A. Styles
  • B. Page Layout
  • C. Breaks
  • D. SmartArt
  • A. Styles
700

Which function returns the average of a set of numbers?

  • A. COUNT
  • B. MEDIAN
  • C. AVERAGE
  • D. MEAN
  • C. AVERAGE
700

What is the purpose of speaker notes?

  • A. Display content on the slide
  • B. Provide slide animations
  • C. Help the presenter remember key points
  • D. Create transitions
  • C. Help the presenter remember key points
700

How often should you update your operating system and software?

  • A. Once a year
  • B. Only when it's broken
  • C. Regularly or when updates are available
  • D. Never
  • C. Regularly or when updates are available
700

Which role is most likely to be involved in interpreting data and creating reports?

  • A. IT Technician
  • B. Data Analyst
  • C. Cybersecurity Analyst
  • D. Network Technician
  • B. Data Analyst
800

What is the purpose of a table of contents in Word?

  • A. List of inserted images
  • B. Document header
  • C. Navigation for major sections
  • D. Formatting summary
  • C. Navigation for major sections
800

How do you reference a cell from another sheet?

  • A. =Sheet1:A1
  • B. =Sheet1!A1
  • C. @Sheet1.A1

      D. #Sheet1A1

  • B. =Sheet1!A1
800

What does the 'Transition' tab allow you to do?

  • A. Add animations to text
  • B. Change slide layouts
  • C. Add effects when moving between slides
  • D. Change the theme color
  • C. Add effects when moving between slides
800

Why is it risky to use public Wi-Fi without a VPN?

  • A. It's slower
  • B. It can drain your battery
  • C. Data can be intercepted by attackers
  • D. You might need to pay
  • C. Data can be intercepted by attackers
800

Who is responsible for planning and designing an organization’s computer systems?

  • A. System Architect
  • B. Help Desk Support
  • C. IT Manager
  • D. Software Tester
  • A. System Architect
900

What does the 'Save As' function allow you to do?

  • A. Exit the document
  • B. Save the document in the cloud
  • C. Rename or change the format/location of a file
  • D. Automatically email the document
  • C. Rename or change the format/location of a file
900

What does the function =IF(A1>10, "Yes", "No") return when A1 is 5?

  • A. Yes
  • B. No
  • C. Error

     D. True

  • B. No
900

Which file extension is used for a PowerPoint Show file?

  • A. .pptx
  • B. .ppsx
  • C. .show
  • D. .slideshow
  • B. .ppsx
900

What is phishing?

  • A. A type of data backup
  • B. Sending fake messages to steal personal information
  • C. A network protocol
  • D. Encrypting files for safety
  • B. Sending fake messages to steal personal information
900

What does an IT Project Manager typically do?

  • A. Code websites
  • B. Plan and oversee technology projects
  • C. Fix network cables
  • D. Test mobile apps
  • B. Plan and oversee technology projects
1000

How do you add a comment in Word 365?

  • A. Review > New Comment
  • B. Insert > Note
  • C. View > Comment
  • D. Design > Add Note

Review > New Comment

1000

Which menu would you use to sort data in Excel?

  • A. File
  • B. Home
  • C. Data
  • D. View
  • C. Data
1000

How can you make a presentation automatically loop?

  • A. Use Slide Sorter view
  • B. Add animations
  • C. Set up slide show to loop
  • D. Save as template
  • C. Set up slide show to loop
1000

Which of the following helps prevent unauthorized access to your computer?

  • A. Leaving it unattended
  • B. Using strong login credentials
  • C. Turning off the firewall
  • D. Disabling updates
  • B. Using strong login credentials
1000

Which role often acts as the bridge between business needs and technology implementation?

  • A. Network Engineer
  • B. Software Developer
  • C. Business Analyst
  • D. Database Developer
  • C. Business Analyst