Accenture Mock Online Assessment PDF
Document Details
Tags
Related
Summary
This document contains a set of multiple-choice questions on various computer science topics, including office software like Microsoft Word and Excel, as well as computer networks. The questions cover topics such as features in Microsoft Office applications, protocols used in computer networks, and basic concepts like computer networks, communication protocols, and security.
Full Transcript
MOCK ONLINE ASSESSMENT ACCENTURE PRIME CODING Which feature in MS Word allows you to create a set of documents that have the same layout but different content? A) Mail Merge B) SmartArt C) Macros D) Templates Which feature in MS Word allows you to create a set of documents that have th...
MOCK ONLINE ASSESSMENT ACCENTURE PRIME CODING Which feature in MS Word allows you to create a set of documents that have the same layout but different content? A) Mail Merge B) SmartArt C) Macros D) Templates Which feature in MS Word allows you to create a set of documents that have the same layout but different content? A) Mail Merge B) SmartArt C) Macros D) Templates In Excel, what does the function =VLOOKUP(A2, B2:C10, 2, FALSE) do? A) Looks up a value in the first column and returns a value in the same row from another column. B) Looks up a value in any column and returns a value from the first column. C) Searches horizontally across the first row. D) Finds the maximum value in a range. In Excel, what does the function =VLOOKUP(A2, B2:C10, 2, FALSE) do? A) Looks up a value in the first column and returns a value in the same row from another column. B) Looks up a value in any column and returns a value from the first column. C) Searches horizontally across the first row. D) Finds the maximum value in a range. Which key combination is used to insert a new slide in a PowerPoint presentation? A) Ctrl + N B) Ctrl + M C) Ctrl + S D) Ctrl + O Which key combination is used to insert a new slide in a PowerPoint presentation? A) Ctrl + N B) Ctrl + M C) Ctrl + S D) Ctrl + O In MS Outlook, what does the "Out of Office" feature do? A) Deletes all emails while you are away. B) Sends an automated reply to incoming emails. C) Redirects all emails to another address. D) Blocks all emails until you return. In MS Outlook, what does the "Out of Office" feature do? A) Deletes all emails while you are away. B) Sends an automated reply to incoming emails. C) Redirects all emails to another address. D) Blocks all emails until you return. What is the default file extension for an Excel 2016 workbook? A).xls B).xlsx C).csv D).xltx What is the default file extension for an Excel 2016 workbook? A).xls B).xlsx C).csv D).xltx Which MS Word feature automatically corrects common typing errors as you type? A) AutoFormat B) AutoCorrect C) SmartArt D) Spell Check Which MS Word feature automatically corrects common typing errors as you type? A) AutoFormat B) AutoCorrect C) SmartArt D) Spell Check Which protocol is used to assign IP addresses automatically to devices on a network? A) DNS B) DHCP C) FTP D) HTTP Which protocol is used to assign IP addresses automatically to devices on a network? A) DNS B) DHCP C) FTP D) HTTP What is the primary purpose of a router in a network? A) To connect different networks together B) To connect multiple devices within the same network C) To encrypt data for secure transmission D) To host websites Which layer of the OSI model is responsible for establishing, managing, and terminating connections? A) Network Layer B) Transport Layer C) Session Layer D) Data Link Layer Which layer of the OSI model is responsible for establishing, managing, and terminating connections? A) Network Layer B) Transport Layer C) Session Layer D) Data Link Layer What does the ping command do? A) Measures the data transfer speed between two devices. B) Tests the reachability of a host on an IP network. C) Encrypts data before sending it over the network. D) Blocks network traffic to specific IP addresses. What does the ping command do? A) Measures the data transfer speed between two devices. B) Tests the reachability of a host on an IP network. C) Encrypts data before sending it over the network. D) Blocks network traffic to specific IP addresses. Which network topology has a central hub to which all other nodes are connected? A) Mesh B) Ring C) Star D) Bus Which network topology has a central hub to which all other nodes are connected? A) Mesh B) Ring C) Star D) Bus Which protocol is commonly used for secure communication over a network? A) HTTP B) FTP C) HTTPS D) SMTP Which protocol is commonly used for secure communication over a network? A) HTTP B) FTP C) HTTPS D) SMTP What is the primary function of a firewall in network security? A) To accelerate internet speed. B) To encrypt network traffic. C) To block unauthorized access to or from a private network. D) To store backup data securely. What is the primary function of a firewall in network security? A) To accelerate internet speed. B) To encrypt network traffic. C) To block unauthorized access to or from a private network. D) To store backup data securely. Which of the following is considered a form of social engineering attack? A) Phishing B) Denial of Service C) SQL Injection D) Malware Which of the following is considered a form of social engineering attack? A) Phishing B) Denial of Service C) SQL Injection D) Malware What does the term "zero-day exploit" refer to? A) A security vulnerability that is unknown to the software vendor. B) A virus that has been active for less than a day. C) A software patch that fixes security vulnerabilities. D) An antivirus software update released on the first day of the month. What does the term "zero-day exploit" refer to? A) A security vulnerability that is unknown to the software vendor. B) A virus that has been active for less than a day. C) A software patch that fixes security vulnerabilities. D) An antivirus software update released on the first day of the month. Which of the following methods is most effective in preventing unauthorized access to a user's account? A) Using a strong password B) Enabling two-factor authentication (2FA) C) Changing passwords frequently D) Using public Wi-Fi networks for login Which of the following methods is most effective in preventing unauthorized access to a user's account? A) Using a strong password B) Enabling two-factor authentication (2FA) C) Changing passwords frequently D) Using public Wi-Fi networks for login What is the purpose of encryption in cybersecurity? A) To compress files for faster transmission B) To hide data from unauthorized users C) To detect intrusions in a network D) To back up data securely What is the purpose of encryption in cybersecurity? A) To compress files for faster transmission B) To hide data from unauthorized users C) To detect intrusions in a network D) To back up data securely Which type of malware encrypts a user's files and demands payment for the decryption key? A) Trojan Horse B) Ransomware C) Spyware D) Worm Which type of malware encrypts a user's files and demands payment for the decryption key? A) Trojan Horse B) Ransomware C) Spyware D) Worm Which of the following is a benefit of using cloud computing? A) Reduced need for physical storage devices B) Higher upfront costs C) Limited scalability D) Increased manual management Which of the following is a benefit of using cloud computing? A) Reduced need for physical storage devices B) Higher upfront costs C) Limited scalability D) Increased manual management What does "SaaS" stand for in cloud computing? A) Storage as a Service B) Software as a Service C) Security as a Service D) System as a Service What does "SaaS" stand for in cloud computing? A) Storage as a Service B) Software as a Service C) Security as a Service D) System as a Service Which cloud service model provides virtualized computing resources over the internet? A) SaaS B) PaaS C) IaaS D) DaaS Which cloud service model provides virtualized computing resources over the internet? A) SaaS B) PaaS C) IaaS D) DaaS Which of the following is NOT a characteristic of cloud computing? A) On-demand self-service B) Broad network access C) Rapid elasticity D) Fixed pricing Which of the following is NOT a characteristic of cloud computing? A) On-demand self-service B) Broad network access C) Rapid elasticity D) Fixed pricing What is the purpose of a Virtual Private Cloud (VPC)? A) To create an isolated section of the cloud for security B) To reduce cloud storage costs C) To increase the speed of cloud services D) To back up data automatically What is the purpose of a Virtual Private Cloud (VPC)? A) To create an isolated section of the cloud for security B) To reduce cloud storage costs C) To increase the speed of cloud services D) To back up data automatically Which cloud deployment model is used by a single organization? A) Public Cloud B) Private Cloud C) Hybrid Cloud D) Community Cloud Which cloud deployment model is used by a single organization? A) Public Cloud B) Private Cloud C) Hybrid Cloud D) Community Cloud Integer n = 5 Integer result = 1 for (i = 1; i 10) A) 5 break B) 10 Print result C) 120 D) 24 Answer: D) 24 Function Fibo(Integer n) if (n 0; i--) arr[i] = arr[i-1] arr = temp Print arr A) 1 2 3 4 5 B) 5 1 2 3 4 C) 4 5 1 2 3 D) 3 4 5 1 2 Answer: B) 5 1 2 3 4 Explanation: The array is rotated right by one position, moving the last element to the front. THANK YOU