Exam 6: Managing Data With Data Tools
Exam 1: Getting Started With Excel64 Questions
Exam 2: Formatting Workbook Text and Data76 Questions
Exam 3: Performing Calculations With Formulas and Functions50 Questions
Exam 4: Analyzing and Charting Financial Data71 Questions
Exam 5: Generating Reports From Multiple Worksheets and Workbooks36 Questions
Exam 6: Managing Data With Data Tools40 Questions
Exam 7: Summarizing Data With Pivottables57 Questions
Exam 8: Performing What-If Analyses61 Questions
Exam 9: Exploring Financial Tools and Functions44 Questions
Exam 10: Analyzing Data With Business Intelligence Tools52 Questions
Exam 11: Exploring Pivottable Design32 Questions
Exam 12: Technology and Computing: Part A22 Questions
Exam 13: Technology and Computing: Part B22 Questions
Select questions type
Which of the following statements about browser security settings are true?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
A,C,D
With more and more people using technology,what physical health diagnosis is on the rise?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
How will you decide which browser security settings to allow and which ones to block?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
In which of the following real-life situations would it be useful to use a digital certificate?
(Multiple Choice)
4.8/5
(27)
Lately you have been noticing more and more ads from clothing stores are popping up on your Facebook page,and when you log into your email there are unsolicited emails from clothing vendors as well.Thinking back,what most likely has changed on your computer to allow these thing to be happening?
(Multiple Choice)
4.9/5
(27)
How can you protect a computer from electrical spikes and surges?
(Multiple Choice)
4.8/5
(29)
You have been asked to create an authentication security plan for your company.Which of the following components would you incorporate to ensure your company is secured?
(Multiple Choice)
4.7/5
(39)
A Trojan is a malicious program that uses a computer network to replicate.
(True/False)
4.9/5
(32)
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
(True/False)
4.8/5
(32)
Marcus recently had his cell phone stolen.All of the following are security features that should help him locate his stolen phone EXCEPT which one?
(Multiple Choice)
4.8/5
(39)
How could an online attacker use your online profile to gather information about you to steal your identity?
(Multiple Choice)
4.8/5
(29)
Which is a first step to deter thieves from accessing your financial information?
(Multiple Choice)
4.8/5
(40)
There are various risks from attacks on Wi-Fi networks.These include all of the following EXCEPT _____.
(Multiple Choice)
4.8/5
(26)
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
(Multiple Choice)
4.8/5
(32)
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)