0% found this document useful (0 votes)
19 views9 pages

AI With ICA

Whmannanagahanamabavahbaabgaa haiagabkaiaha hakagabskaiaha

Uploaded by

syedasifabba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views9 pages

AI With ICA

Whmannanagahanamabavahbaabgaa haiagabkaiaha hakagabskaiaha

Uploaded by

syedasifabba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

Reg no : Assignment # 04
Name : Date: 27-12-2024

Program : BS(PH) Class &Section : BS(PH)-1A


Course Name :Intro.to.Computer.Applications Duration : 17th Jan, 2025
Instructor’s Name : Abdul Salam Marks : 10

Hand-Written Acceptable Only

Upload Marked Assignments on Portal

Use of ChatGPT will only destroy your Learning Skills so avoid it

Assignment Questions:
General MS Office

1. What is Microsoft Office, and what are its main applications?

2. How do you create a new document in Word?

3. What are templates in MS Office, and how are they used?

4. How do you save a document in different formats in Word?

5. What is the purpose of the Ribbon in MS Office applications?

6. Explain how to insert a header and footer in a Word document.

7. What are styles, and how do you apply them in Word?

8. How do you create and format tables in Excel?

9. What is the difference between relative and absolute cell references in Excel?

10. Explain how to use the SUM function in Excel.

MS Word

11. How do you check spelling and grammar in a Word document?

12. What is the purpose of the Mail Merge feature in Word?

13. How can you add comments to a Word document?

14. Describe how to insert images into a Word document.


Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

15. What are SmartArt graphics, and how do you use them in Word?

16. How do you track changes in a Word document?

17. What is the difference between a page break and a section break in Word?

18. How can you create a table of contents in Word?

19. What are bookmarks in Word, and how are they used?

20. Explain how to create and use styles in Word.

MS Excel

21. How do you create a chart in Excel?

22. What is conditional formatting, and how is it applied?

23. How do you use the VLOOKUP function in Excel?

24. Explain how to create a pivot table in Excel.

25. What are data validation rules in Excel, and why are they useful?

26. How do you freeze panes in Excel?

27. What is the purpose of the IF function in Excel?

28. How can you import data from a CSV file into Excel?

29. Explain how to use the COUNTIF function.

30. How do you create a macro in Excel?

MS PowerPoint

31. How do you create a new presentation in PowerPoint?

32. What are slide layouts, and how do you use them?

33. Explain how to add transitions between slides in PowerPoint.

34. How do you insert audio or video into a PowerPoint presentation?

35. What is the purpose of the Slide Master in PowerPoint?

36. How do you rehearse timings for a PowerPoint presentation?

37. What are action buttons, and how do you use them?

38. How can you share a PowerPoint presentation for collaboration?

39. Describe how to create a custom animation in PowerPoint.


Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

40. What is the Presenter View, and how is it beneficial?

MS Outlook

41. How do you set up an email account in Outlook?

42. Explain the use of folders in Outlook for organizing emails.

43. How do you schedule a meeting in Outlook?

44. What is the Calendar feature in Outlook used for?

45. How do you create a contact group in Outlook?

46. Describe how to use rules for managing emails in Outlook.

47. How do you add an attachment to an email in Outlook?

48. What are the benefits of using the Focused Inbox in Outlook?

49. How can you search for specific emails in Outlook?

50. Explain how to set up email signatures in Outlook.

MS Access

51. What is Microsoft Access, and what is it primarily used for?

52. How do you create a new database in Access?

53. Explain the difference between a table and a query in Access.

54. What are forms in Access, and how are they created?

55. How do you create relationships between tables in Access?

56. What is a primary key, and why is it important in Access?

57. How can you run a query in Access?

58. What are reports in Access, and how do you generate them?

59. Describe the steps to import data into Access from Excel.

60. How do you create a user-defined function in Access?

The Internet

61. What is the Internet, and how does it function?

62. Explain the difference between the World Wide Web and the Internet.

63. What are IP addresses, and why are they important?


Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

64. How do web browsers work?

65. What is a search engine, and how does it function?

66. Explain the concept of HTML.

67. What are cookies, and how do they affect your browsing experience?

68. How do you use bookmarks in a web browser?

69. What is the purpose of a domain name?

70. Explain what HTTPS means and its significance.

71. What is an online community, and how does it differ from a forum?

72. How do you ensure your online privacy?

73. What are phishing scams, and how can you avoid them?

74. Explain the role of an internet service provider (ISP).

75. What are VPNs, and why are they used?

76. How do social media platforms impact communication?

77. What is net neutrality?

78. Explain the significance of cybersecurity.

79. How do you safely download files from the Internet?

80. What are the different types of web hosting?

81. What is cloud computing?

82. How does e-commerce work?

83. Explain the concept of digital marketing.

84. What is a blog, and how is it different from a website?

85. How do you create an email account?

86. What are the advantages of online education?

87. Explain what a URL is and its components.

88. What is bandwidth, and why does it matter?

89. How do you identify a secure website?

90. What are forums, and how are they used for discussions?
Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

Computer Viruses

91. What is a computer virus, and how does it spread?

92. Explain the difference between a virus and malware.

93. How can you protect your computer from viruses?

94. What are some common symptoms of a virus infection?

95. How do antivirus programs work?

96. What is a worm, and how does it differ from a virus?

97. Explain the role of firewalls in protecting against viruses.

98. What is ransomware, and how does it affect users?

99. How can you remove a virus from your computer?

100. What are trojan horses, and how do they operate?

101. What is social engineering, and how is it related to virus attacks?

102. How can you prevent phishing attacks?

103. What is the significance of software updates in virus prevention?

104. Describe how a keylogger operates.

105. What are rootkits, and why are they dangerous?

106. How can downloading files from unknown sources lead to virus infections?

107. What steps should you take if you suspect a virus infection?

108. Explain the purpose of a security patch.

109. How do adware and spyware differ from traditional viruses?

110. What are the risks associated with using public Wi-Fi networks?

111. How can email attachments spread viruses?

112. What is the importance of backing up your data in relation to viruses?

113. Describe the impact of computer viruses on businesses.

114. What are the most common types of computer viruses?

115. How do file-sharing applications pose a risk for viruses?

116. Explain the concept of a botnet.


Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

117. What is the difference between a computer virus and a worm?

118. How can using strong passwords help protect against viruses?

119. What are the legal implications of spreading viruses?

120. Describe how a virus can affect system performance.

121. How does a firewall protect your computer from viruses?

122. What are the best practices for secure online browsing?

123. Explain how to identify a phishing email.

124. What is the function of a VPN in online security?

125. How can you secure your home network against intrusions?

126. What role does encryption play in data protection?

127. How can parental controls help in managing online activity?

128. What are the dangers of using outdated software?

129. How do you securely dispose of old computers or devices?

130. What are the signs that your computer may be infected with a virus?

131. How do internet scams work, and what are some examples?

132. What is the difference between public and private IP addresses?

133. How do you report a virus or malware attack?

134. What precautions should you take when using social media?

135. How does ad-blocking software enhance online security?

136. What is a digital footprint, and why is it important to manage it?

137. Explain the process of creating a strong password.

138. What are some common myths about computer viruses?

139. How do cybercriminals exploit software vulnerabilities?

140. What should you do if you receive a suspicious link in an email?

141. How do you perform a virus scan on your computer?

142. What is the importance of user education in cybersecurity?

143. How can you recognize a secure online shopping site?


Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

144. What are the risks associated with using torrent sites?

145. How do data breaches occur, and what are their consequences?

146. What are the advantages of using multi-factor authentication?

147. Explain the significance of digital certificates.

148. How do you keep your personal information secure online?

149. What are the steps to take when creating a new online account?

150. How does two-step verification enhance online security?

151. What is the difference between symmetric and asymmetric encryption?

152. How do you recognize and avoid online scams?

153. What measures can organizations take to enhance cybersecurity?

154. What are the potential consequences of ignoring software updates?

155. How do social media platforms handle user data security?

156. What is the role of ethical hacking in cybersecurity?

157. How can online gaming expose users to security risks?

158. What are some tools for monitoring network security?

159. Explain the concept of cyber hygiene.

160. What is the role of incident response in cybersecurity?

161. How do you protect your smartphone from viruses?

162. What are the benefits of using an antivirus program?

163. How do fake websites pose risks to users?

164. Explain the importance of software licensing and copyright laws.

165. What are the implications of using pirated software?

166. How can browser extensions enhance online security?

167. What should you do if your personal information is compromised?

168. What is the impact of cyberbullying in online communities?

169. How do you safely shop online?

170. What is the purpose of a security audit?


Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

171. What are the signs of identity theft?

172. How can you protect your children while they are online?

173. What are some common methods used in social engineering attacks?

174. How do mobile apps pose security risks?

175. What is the role of the Cybersecurity and Infrastructure Security Agency (CISA)?

176. How can you detect a fake email address?

177. What is the importance of using secure passwords?

178. How can you secure your cloud storage accounts?

179. What are the consequences of not having a cybersecurity plan?

180. How do you recover from a ransomware attack?

181. What should you include in a cybersecurity policy?

182. How do companies respond to data breaches?

183. What are the best practices for handling sensitive data?

184. How does a VPN protect your privacy online?

185. What are some common cybersecurity certifications?

186. How do online reviews influence consumer decisions?

187. What is the role of an IT security consultant?

188. How can public Wi-Fi networks be secured?

189. What are the implications of GDPR for online privacy?

190. How can you minimize your digital footprint?

191. What steps should be taken after a cyberattack?

192. How do you identify secure websites when shopping online?

193. What is the purpose of penetration testing?

194. How does artificial intelligence enhance cybersecurity?

195. What are the risks of sharing personal information on social media?

196. How do data analytics help in predicting cyber threats?

197. What are the differences between black hat and white hat hackers?
Bahria University Islamabad

COMPUTER SCIENCE DEPARTMENT

198. How do companies train employees on cybersecurity awareness?

199. What are the emerging trends in cybersecurity?

200. How can individuals protect their digital assets?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy