Exam 10: Data Analysis With Power Tools and Creating Macros
Exam 1: Creating a Worksheet and a Chart25 Questions
Exam 2: Formulas,functions,and Formatting25 Questions
Exam 3: Working With Large Worksheets, charting, and What-If Analysis25 Questions
Exam 4: Financial Functions, data Tables, and Amortization Schedules25 Questions
Exam 5: Working With Multiple Worksheets and Workbooks25 Questions
Exam 6: Creating,sorting,and Querying a Table25 Questions
Exam 7: Creating Templates, importing Data, and Working With Smartart, images, and Screenshots25 Questions
Exam 8: Working With Trendlines, pivot Table Reports, pivotchart Reports, and Slicers25 Questions
Exam 9: Formula Auditing, data Validation, and Complex Problem Solving22 Questions
Exam 10: Data Analysis With Power Tools and Creating Macros25 Questions
Exam 11: User Interfaces, visual Basic for Applications Vba, and Collaboration Features in Excel25 Questions
Select questions type
Quincy's password was recently stolen by a hacker who used a keylogger to capture Quincy's password as he entered it on his computer.What kind of malware is a keylogger?
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
B
Marley just bought a new wireless router for her apartment.When she gets home,she connects the router to the modem,her printer,her laptop,and her smartphone.Which of these devices provides a connection for her network to the Internet?
Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
C
Which network type is often used for vendor access?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
C
Which network topology is most likely to continue to function well even if one device fails?
(Multiple Choice)
4.9/5
(35)
Sonia works from home and uses the Internet often throughout the day.When they're home,Sonia's husband and children also use her network for gaming,social media,and streaming videos or music.What kind of network best describes Sonia's network?
(Multiple Choice)
4.8/5
(33)
Rachelle is an office manager for an active real estate agency.She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff.What technology can she use to solve this problem?
(Multiple Choice)
4.9/5
(37)
Which of the following is the most secure SSID for a wireless network at a family residence?
(Multiple Choice)
4.7/5
(38)
Donna is setting up her own web server to provide information to her clients.How will her web server be uniquely identified on the Internet?
(Multiple Choice)
4.9/5
(35)
Aisha's boss asked her to order a new NAS device to provide network storage for their office.She knows she needs multiple hard drives for the device.What other feature is important to ensure high performance for this device?
(Multiple Choice)
4.8/5
(36)
Which of the following devices is most likely owned and provided by the ISP?
(Multiple Choice)
4.8/5
(43)
Sandhya is installing a security camera at the entrance to her office.The camera needs power and network access,but there's no power outlet near the door.What technology can Sandhya use to get power to the security camera?
(Multiple Choice)
4.9/5
(39)
Which of the following items is NOT required to have a functioning network?
(Multiple Choice)
4.9/5
(35)
When an ISP throttles,or slows down,one customer's very busy Internet activity so that other customers don't experience slower Internet service,what concept is being challenged?
(Multiple Choice)
4.9/5
(42)
Tori is traveling for a business conference and needs to order a computer part so it will arrive at her hotel before her presentation at the end of the week.To do this,she'll need to enter her credit card number over the hotel's wireless network.How can Tori protect her financial information?
(Multiple Choice)
4.9/5
(40)
Which of the following terms would a café or coffee shop most likely require of customers before allowing them to use the restaurant's Wi-Fi hotspot? Choose all that apply.
(Multiple Choice)
4.8/5
(37)
When your computer accesses a webpage,what network architecture role is your computer filling?
(Multiple Choice)
4.8/5
(35)
Which of these devices would least likely be found on a modern network?
(Multiple Choice)
4.8/5
(32)
Kabir just bought a new wireless router and wants to make sure his network will be secure from other people using it without his permission.He's working on configuring security settings for the wireless network and is trying to think through all the settings that will help protect his network.What should Kabir configure so no one can change his network's settings?
(Multiple Choice)
4.7/5
(37)
Liesel is working on a research paper on a computer at her school's library.She saves it to the cloud,then signs off and packs her bookbag so she can get to class on time.On what device is her filed stored?
(Multiple Choice)
4.9/5
(31)
What kind of cable is connected to a DSL modem on the ISP's side of the device?
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)