Exam 6: Creating, sorting, and Querying a Table
Exam 1: Creating a Worksheet and a Chart54 Questions
Exam 2: Formulas, functions, and Formatting63 Questions
Exam 3: Working With Large Worksheets, charting, and What-If Analysis42 Questions
Exam 4: Financial Functions, data Tables, and Amortization Schedules58 Questions
Exam 5: Working With Multiple Worksheets and Workbooks32 Questions
Exam 6: Creating, sorting, and Querying a Table32 Questions
Exam 7: Creating Templates, importing Data, and Working With Smartart, images, and Screenshots44 Questions
Exam 8: Working With Trendlines, pivot Table Reports, pivotchart Reports, and Slicers53 Questions
Exam 9: Formula Auditing, data Validation, and Complex Problem Solving36 Questions
Exam 10: Data Analysis With Power Tools and Creating Macros45 Questions
Exam 11: User Interfaces, visual Basic for Applications Vba, and Collaboration Features in Excel25 Questions
Exam 12: Post-Assessment22 Questions
Exam 13: Pre-Assessment22 Questions
Select questions type
What would a password manager allow you to do?
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
B
How can an attacker execute malware through a script?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B
In which of the following real-life situations would it be useful to use a digital certificate?
(Multiple Choice)
4.9/5
(41)
How is the environment impacted by computers being thrown away in landfills?
(Multiple Choice)
4.8/5
(36)
How can you protect your information when using social media?
(Multiple Choice)
4.9/5
(24)
Marcus recently had his cell phone stolen.All of the following are security features that should help him locate his stolen phone EXCEPT which one?
(Multiple Choice)
4.8/5
(28)
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
(Multiple Choice)
4.8/5
(31)
How can you protect a computer from electrical spikes and surges?
(Multiple Choice)
4.9/5
(38)
You are watching the news and learn that there has been a security breach of credit card information at a large department store.The news report also states that the same company has had recent layoffs.The report says that the company is looking into whether or not the breach was done by an insider.Why would the company investigate the possibility of the breach being from an insider?
(Multiple Choice)
4.8/5
(40)
To prevent a laptop from being stolen,you can use a timelock device.
(True/False)
4.9/5
(35)
With more and more people using technology,what physical health diagnosis is on the rise?
(Multiple Choice)
4.7/5
(38)
Technology can lead to all of the following behavioral risks EXCEPT _____.
(Multiple Choice)
4.9/5
(31)
A Trojan is a malicious program that uses a computer network to replicate.
(True/False)
4.9/5
(35)
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
(True/False)
4.9/5
(25)
How could an online attacker use your online profile to gather information about you to steal your identity?
(Multiple Choice)
4.8/5
(29)
In terms of privacy,which of the following is a best practice?
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)