Exam 10: Analyzing Data With Business Intelligence Tools
Exam 1: Getting Started With Excel64 Questions
Exam 2: Formatting Workbook Text and Data76 Questions
Exam 3: Performing Calculations With Formulas and Functions50 Questions
Exam 4: Analyzing and Charting Financial Data71 Questions
Exam 5: Generating Reports From Multiple Worksheets and Workbooks36 Questions
Exam 6: Managing Data With Data Tools40 Questions
Exam 7: Summarizing Data With Pivottables57 Questions
Exam 8: Performing What-If Analyses61 Questions
Exam 9: Exploring Financial Tools and Functions44 Questions
Exam 10: Analyzing Data With Business Intelligence Tools52 Questions
Exam 11: Exploring Pivottable Design32 Questions
Exam 12: Developing an Excel Application22 Questions
Exam 13: Customizing Your Workspace Text and Graphics22 Questions
Select questions type
Which of the following is true about broadband connections?
(Multiple Choice)
4.7/5
(33)
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.
(True/False)
4.9/5
(39)
What does a DSL modem use to send and receive digital data?
(Multiple Choice)
4.9/5
(37)
How does a wireless network key work with an encrypted wireless network?
(Multiple Choice)
4.8/5
(33)
After purchasing a new wireless router to replace your old one, what steps should you take to ensure your devices are secure?
(Multiple Choice)
4.9/5
(29)
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia NOT connect to?
(Multiple Choice)
4.8/5
(37)
When describing a client/server network, which of the following would be considered a client?
(Multiple Choice)
4.8/5
(32)
Which of the following could indicate a DoS attack on your company server?
(Multiple Choice)
4.9/5
(33)
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
(Multiple Choice)
4.9/5
(39)
After your last family vacation, everyone uploaded their photos to a NAS device so everyone would have access to view them.
(True/False)
4.9/5
(37)
You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened?
(Multiple Choice)
4.8/5
(30)
Which of the following would be considered a strong password?
(Multiple Choice)
4.7/5
(40)
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
(Multiple Choice)
4.7/5
(36)
Which of the following statements is NOT true about a local firewall?
(Multiple Choice)
4.9/5
(39)
Which of the following statements is true about public networks?
(Multiple Choice)
4.7/5
(38)
What is the U.S. Federal Communication Commission's role in regard to Internet access?
(Multiple Choice)
4.8/5
(34)
In a connected network, how are hubs and switches similar to one another?
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)