Exam 10: Analyzing Data With Business Intelligence Tools
Exam 1: Getting Started With Excel64 Questions
Exam 2: Formatting Workbook Text and Data76 Questions
Exam 3: Performing Calculations With Formulas and Functions50 Questions
Exam 4: Analyzing and Charting Financial Data71 Questions
Exam 5: Generating Reports From Multiple Worksheets and Workbooks36 Questions
Exam 6: Managing Data With Data Tools40 Questions
Exam 7: Summarizing Data With Pivottables57 Questions
Exam 8: Performing What-If Analyses61 Questions
Exam 9: Exploring Financial Tools and Functions44 Questions
Exam 10: Analyzing Data With Business Intelligence Tools52 Questions
Exam 11: Exploring Pivottable Design32 Questions
Exam 12: Developing an Excel Application22 Questions
Exam 13: Customizing Your Workspace Text and Graphics22 Questions
Select questions type
As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B
To encrypt data sent between devices, a wireless network key that uses a series of letters and symbols is often used.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
When using encryption from your home computer, how would you configure the router?
Free
(Multiple Choice)
5.0/5
(40)
Correct Answer:
A
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as mobile hotspots.
(True/False)
4.9/5
(39)
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
(True/False)
4.7/5
(30)
As you consider the different methods of sharing files, which of the following is a disadvantage of cloud computing?
(Multiple Choice)
4.8/5
(30)
Which of the following statements do supporters of net neutrality agree with?
(Multiple Choice)
4.7/5
(37)
What internal device does a computer use to connect to a wired or a wireless network?
(Multiple Choice)
4.7/5
(34)
The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages?
(Multiple Choice)
4.9/5
(34)
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
(Multiple Choice)
4.8/5
(33)
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
(Multiple Choice)
4.7/5
(29)
In addition to choosing a strong password, which of the following would be the best authentication method(s) to keep your data safe?
(Multiple Choice)
4.7/5
(29)
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
(Multiple Choice)
4.8/5
(25)
Which of the following is not a resource able to be shared in a network?
(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)