Exam 10: Analyzing Data With Business Intelligence Tools
Exam 1: Getting Started With Excel64 Questions
Exam 2: Formatting Workbook Text and Data76 Questions
Exam 3: Performing Calculations With Formulas and Functions50 Questions
Exam 4: Analyzing and Charting Financial Data71 Questions
Exam 5: Generating Reports From Multiple Worksheets and Workbooks36 Questions
Exam 6: Managing Data With Data Tools40 Questions
Exam 7: Summarizing Data With Pivottables57 Questions
Exam 8: Performing What-If Analyses61 Questions
Exam 9: Exploring Financial Tools and Functions44 Questions
Exam 10: Analyzing Data With Business Intelligence Tools52 Questions
Exam 11: Exploring Pivottable Design32 Questions
Exam 12: Technology and Computing: Part A22 Questions
Exam 13: Technology and Computing: Part B22 Questions
Select questions type
What hardware is essential to creating a home Wi-Fi network?
(Multiple Choice)
4.8/5
(35)
While waiting for her latte at Starbucks,Georgia decides to check her work email and pay a few bills online.She opens the Wi-Fi settings on her device and sees several connections available.Knowing the activities she plans to do online,which of the following networks should Georgia NOT connect to?
(Multiple Choice)
4.9/5
(36)
If you connect to a Wi-Fi network that does not require a wireless network key,it is still secure enough to send private information because wireless networks encrypt all data anyway.
(True/False)
4.7/5
(34)
In a connected network,how are hubs and switches similar to one another?
(Multiple Choice)
4.7/5
(36)
After purchasing a new wireless router to replace your old one,what steps should you take to ensure your devices are secure?
(Multiple Choice)
5.0/5
(34)
In a _____ network,each device on the network is attached to a central server.If the server fails,then the other devices will be unable to communicate,but if a connected device fails,then all other devices will still be able to communicate.
(Multiple Choice)
4.8/5
(39)
What is the U.S.Federal Communication Commission's role in regard to Internet access?
(Multiple Choice)
4.9/5
(42)
As you consider the different methods of sharing files,which of the following is a disadvantage of cloud computing?
(Multiple Choice)
4.9/5
(30)
When it comes to secure data storage on a network,which of the following statements is true?
(Multiple Choice)
4.9/5
(37)
How will cellular networks challenge cable and DSL providers in the future?
(Multiple Choice)
4.7/5
(37)
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
(Multiple Choice)
4.8/5
(38)
RFID is a network protocol used in credit cards,smartphones,and tickets to facilitate close-range communication.
(True/False)
5.0/5
(35)
When describing a client/server network,which of the following would be considered a client?
(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)