AI With ICA
AI With ICA
Reg no : Assignment # 04
Name : Date: 27-12-2024
Assignment Questions:
General MS Office
9. What is the difference between relative and absolute cell references in Excel?
MS Word
15. What are SmartArt graphics, and how do you use them in Word?
17. What is the difference between a page break and a section break in Word?
19. What are bookmarks in Word, and how are they used?
MS Excel
25. What are data validation rules in Excel, and why are they useful?
28. How can you import data from a CSV file into Excel?
MS PowerPoint
32. What are slide layouts, and how do you use them?
37. What are action buttons, and how do you use them?
MS Outlook
48. What are the benefits of using the Focused Inbox in Outlook?
MS Access
54. What are forms in Access, and how are they created?
58. What are reports in Access, and how do you generate them?
59. Describe the steps to import data into Access from Excel.
The Internet
62. Explain the difference between the World Wide Web and the Internet.
67. What are cookies, and how do they affect your browsing experience?
71. What is an online community, and how does it differ from a forum?
73. What are phishing scams, and how can you avoid them?
90. What are forums, and how are they used for discussions?
Bahria University Islamabad
Computer Viruses
106. How can downloading files from unknown sources lead to virus infections?
107. What steps should you take if you suspect a virus infection?
110. What are the risks associated with using public Wi-Fi networks?
118. How can using strong passwords help protect against viruses?
122. What are the best practices for secure online browsing?
125. How can you secure your home network against intrusions?
130. What are the signs that your computer may be infected with a virus?
131. How do internet scams work, and what are some examples?
134. What precautions should you take when using social media?
144. What are the risks associated with using torrent sites?
145. How do data breaches occur, and what are their consequences?
149. What are the steps to take when creating a new online account?
172. How can you protect your children while they are online?
173. What are some common methods used in social engineering attacks?
175. What is the role of the Cybersecurity and Infrastructure Security Agency (CISA)?
183. What are the best practices for handling sensitive data?
195. What are the risks of sharing personal information on social media?
197. What are the differences between black hat and white hat hackers?
Bahria University Islamabad