Exam 12: Developing an Excel Application
Exam 1: Getting Started With Excel64 Questions
Exam 2: Formatting Workbook Text and Data76 Questions
Exam 3: Performing Calculations With Formulas and Functions50 Questions
Exam 4: Analyzing and Charting Financial Data71 Questions
Exam 5: Generating Reports From Multiple Worksheets and Workbooks36 Questions
Exam 6: Managing Data With Data Tools40 Questions
Exam 7: Summarizing Data With Pivottables57 Questions
Exam 8: Performing What-If Analyses61 Questions
Exam 9: Exploring Financial Tools and Functions44 Questions
Exam 10: Analyzing Data With Business Intelligence Tools52 Questions
Exam 11: Exploring Pivottable Design32 Questions
Exam 12: Developing an Excel Application22 Questions
Exam 13: Customizing Your Workspace Text and Graphics22 Questions
Select questions type
What type of cyberattack is used to trick a user into giving valuable information to an attacker?
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
D
Bernie is an aspiring video game developer. Learning which of the following software(s) would benefit him the most?
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
C
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of the larger umbrella of Google.
(True/False)
4.9/5
(42)
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
(True/False)
4.9/5
(28)
Speech recognition software allows a device like a laptop or smartphone to recognize the user's voice.
(True/False)
4.9/5
(30)
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
(True/False)
4.8/5
(32)
If you want to be sure you are practicing green computing, which of the following would be something you would do?
(Multiple Choice)
4.7/5
(27)
The practice of social curation is when a website provides links to other relevant websites in its field.
(True/False)
4.7/5
(35)
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?
(Multiple Choice)
4.8/5
(32)
The direction in which text is printed on a page is called style.
(True/False)
4.9/5
(39)
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
(True/False)
4.9/5
(35)
In which phase of the software development life cycle are the necessary hardware and programming languages/tools acquired?
(Multiple Choice)
4.9/5
(23)
Which of the following statements is NOT true about network standards?
(Multiple Choice)
4.9/5
(31)
Development is the process of creating programs and apps from idea stage to distribution to users.
(True/False)
4.9/5
(35)
Showing 1 - 20 of 22
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)