Exam 10: Data Analysis With Power Tools and Creating Macros
Exam 1: Creating a Worksheet and a Chart54 Questions
Exam 2: Formulas, functions, and Formatting63 Questions
Exam 3: Working With Large Worksheets, charting, and What-If Analysis42 Questions
Exam 4: Financial Functions, data Tables, and Amortization Schedules58 Questions
Exam 5: Working With Multiple Worksheets and Workbooks32 Questions
Exam 6: Creating, sorting, and Querying a Table32 Questions
Exam 7: Creating Templates, importing Data, and Working With Smartart, images, and Screenshots44 Questions
Exam 8: Working With Trendlines, pivot Table Reports, pivotchart Reports, and Slicers53 Questions
Exam 9: Formula Auditing, data Validation, and Complex Problem Solving36 Questions
Exam 10: Data Analysis With Power Tools and Creating Macros45 Questions
Exam 11: User Interfaces, visual Basic for Applications Vba, and Collaboration Features in Excel25 Questions
Exam 12: Post-Assessment22 Questions
Exam 13: Pre-Assessment22 Questions
Select questions type
If you connect to a Wi-Fi network that does not require a wireless network key,it is still secure enough to send private information because wireless networks encrypt all data anyway.
(True/False)
4.8/5
(41)
After receiving an email from what appeared to be your bank,why did you become suspicious that this was a phishing email?
(Multiple Choice)
4.7/5
(36)
Which of the following would be considered a strong password?
(Multiple Choice)
5.0/5
(37)
What internal device does a computer use to connect to a wired or a wireless network?
(Multiple Choice)
4.8/5
(39)
When it comes to secure data storage on a network,which of the following statements is true?
(Multiple Choice)
4.9/5
(28)
To encrypt data sent between devices,a wireless network key that uses a series of letters and symbols is often used.
(True/False)
4.8/5
(39)
To protect a computer or a server,a(n)______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
(Multiple Choice)
4.8/5
(29)
What hardware is essential to creating a home Wi-Fi network?
(Multiple Choice)
4.9/5
(47)
In a _____ network,each device on the network is attached to a central server.If the server fails,then the other devices will be unable to communicate,but if a connected device fails,then all other devices will still be able to communicate.
(Multiple Choice)
4.7/5
(39)
Which of the following could indicate a DoS attack on your company server?
(Multiple Choice)
4.8/5
(33)
In order for your router to access Internet connections,it must be connected to a _____.
(Multiple Choice)
4.9/5
(42)
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
(Multiple Choice)
4.8/5
(36)
How does a wireless network key work with an encrypted wireless network?
(Multiple Choice)
4.8/5
(34)
After your last family vacation,everyone uploaded their photos to a NAS device so everyone would have access to view them.
(True/False)
4.9/5
(40)
Which of the following is true about broadband connections?
(Multiple Choice)
4.9/5
(31)
How will cellular networks challenge cable and DSL providers in the future?
(Multiple Choice)
4.7/5
(30)
To protect confidential company information from hackers while at a work conference,you must be sure to use which of the following networks when accessing the Internet at a hotel?
(Multiple Choice)
4.8/5
(27)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(38)
- Short Answer(0)
- True False(7)
- Matching(0)