Exam 6: Creating, sorting, and Querying a Table
Exam 1: Creating a Worksheet and a Chart54 Questions
Exam 2: Formulas, functions, and Formatting63 Questions
Exam 3: Working With Large Worksheets, charting, and What-If Analysis42 Questions
Exam 4: Financial Functions, data Tables, and Amortization Schedules58 Questions
Exam 5: Working With Multiple Worksheets and Workbooks32 Questions
Exam 6: Creating, sorting, and Querying a Table32 Questions
Exam 7: Creating Templates, importing Data, and Working With Smartart, images, and Screenshots44 Questions
Exam 8: Working With Trendlines, pivot Table Reports, pivotchart Reports, and Slicers53 Questions
Exam 9: Formula Auditing, data Validation, and Complex Problem Solving36 Questions
Exam 10: Data Analysis With Power Tools and Creating Macros45 Questions
Exam 11: User Interfaces, visual Basic for Applications Vba, and Collaboration Features in Excel25 Questions
Exam 12: Post-Assessment22 Questions
Exam 13: Pre-Assessment22 Questions
Select questions type
Emma downloaded a new game from an unfamiliar website.A few days later,Emma realized her system had been hacked and her credit card numbers were stolen.Without Emma knowing,what type of malware might she have downloaded to her computer?
(Multiple Choice)
4.8/5
(41)
Isabel received a message on her computer that appeared to be from the FBI.It informed her that her computer has been locked and she would need to pay a fee to retrieve her data.How would you describe what is happening?
(Multiple Choice)
4.9/5
(36)
Which of the following is a characteristic of a strong password?
(Multiple Choice)
4.9/5
(38)
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
(True/False)
4.9/5
(29)
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
(Multiple Choice)
4.8/5
(29)
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
(Multiple Choice)
4.7/5
(36)
After Penny broke up with her boyfriend,he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating.He even lied about their breakup,creating rumors about her behavior.Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated.Penny is a victim of ________.
(Multiple Choice)
4.7/5
(22)
There are various risks from attacks on Wi-Fi networks.These include all of the following EXCEPT _____.
(Multiple Choice)
4.8/5
(33)
Which is a first step to deter thieves from accessing your financial information?
(Multiple Choice)
4.7/5
(31)
To protect your information and help you to remember passwords,use your social media account login information to log into another site.
(True/False)
4.7/5
(38)
How will you decide which browser security settings to allow and which ones to block?
(Multiple Choice)
4.8/5
(40)
Showing 21 - 32 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)