Computer Practice Exam Set-6 24 Created by admin COMPUTER Practice Question For Competitive Exams SET-6 1 / 10 Q. The identity of secure websites are: Website requires biometrics to login Asks to login using email id and password Asks to login using OTP Indicates a lock in front of the URL and begins https: 2 / 10 Q. Software piracy refers to Selling software online with a proper license key Gain access of a website and perform illegal activity Open source software Stealing software and distributing the unlicensed copies 3 / 10 Q. You can insert a picture from the clipboard using which of these steps? a) Insert from another document b) Copy and Paste c) Cut and Paste d) Option b) and c) 4 / 10 To cut off the part of the image is known as a) cut off b) cropping c) trimming d) wrapping 5 / 10 Which of the following is a model document that can be used to create another document? a) Style b) Template c) Table of content d) Sample 6 / 10 Q. The wizard provides an option to create templates based on: a) Letters b) Faxes c) Agendas d) All of the above 7 / 10 Q. Before creating a table of contents user need to make sure a) The document must contain images b) The document must contain tables c) The document must contain headings d) The document must contain bullets and numbering 8 / 10 Q. The _____________ is a quick way to make a list of people’s mailing addresses and generate labels or envelops for a different person on each label or envelop. a) mail merge b) letters and envelope c) label database d) envelop database 9 / 10 Q. Each and every part of the address block is known as a) row b) column c) field d) label 10 / 10 The __________ is a middle-man file is being created in the mail merge process. a) letter b) template c) address block d) data source Your score is LinkedIn Facebook VKontakte 0% Restart quiz