Exam 8: Performing What-If Analyses
Exam 1: Getting Started With Excel64 Questions
Exam 2: Formatting Workbook Text and Data76 Questions
Exam 3: Performing Calculations With Formulas and Functions50 Questions
Exam 4: Analyzing and Charting Financial Data71 Questions
Exam 5: Generating Reports From Multiple Worksheets and Workbooks36 Questions
Exam 6: Managing Data With Data Tools40 Questions
Exam 7: Summarizing Data With Pivottables57 Questions
Exam 8: Performing What-If Analyses61 Questions
Exam 9: Exploring Financial Tools and Functions44 Questions
Exam 10: Analyzing Data With Business Intelligence Tools52 Questions
Exam 11: Exploring Pivottable Design32 Questions
Exam 12: Developing an Excel Application22 Questions
Exam 13: Customizing Your Workspace Text and Graphics22 Questions
Select questions type
Programmers use compilers to test code in one section, or an entire program, to determine any errors and provide suggestions to fix them.
(True/False)
4.9/5
(26)
An organization intends to purchase the license of a software to provide access to as many users as it wants, either by individual installations or network access or Internet passwords. Which of the following should the organization purchase?
(Multiple Choice)
4.7/5
(40)
Which of the following is a common infringement on copyright where people illegally copy software, movies, music, and other digital materials.
(Multiple Choice)
4.9/5
(22)
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
(Multiple Choice)
4.7/5
(40)
In which phase of the SDLC life cycle is the feasibility study done to determine if the project is worth pursuing?
(Multiple Choice)
5.0/5
(34)
During which phase and by whom should the software product be tested for security, hacking, and proper functionality?
(Multiple Choice)
4.7/5
(38)
Which of the following statements is/are true with regard to purchasing programs and applications online?
(Multiple Choice)
4.9/5
(34)
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?
(Multiple Choice)
5.0/5
(25)
____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.
(Multiple Choice)
4.8/5
(42)
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.
(True/False)
4.9/5
(36)
Which of the following could be the disadvantage(s) of installing or running a freeware or a shareware over other paid programs?
(Multiple Choice)
4.9/5
(43)
Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpage instructed her to follow a few steps after which she found her laptop functioning erratically. Connie had restricted access to her own folders and the data was encrypted. She was asked to pay for an access key to release them. What kind of malware attack is this?
(Multiple Choice)
4.8/5
(37)
Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent?
(Multiple Choice)
4.7/5
(39)
_________ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity.
(Multiple Choice)
4.7/5
(30)
Which of the following show the characteristics of adaptive development methodology?
(Multiple Choice)
4.9/5
(23)
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
(Multiple Choice)
4.9/5
(38)
A software development team was asked to release a banking app by a certain date. The app is vast with high security access controls and multiple other features. The team could not meet the deadline with all of the features in it. Which of the following options is the best possible way to troubleshoot this scenario?
(Multiple Choice)
4.9/5
(44)
Which of the following is/are true about public domain programs?
(Multiple Choice)
4.9/5
(33)
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.
(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 61
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)