INFS Stewart Exam 2
1) The ________ function is used to join the text from two or more cells into one cell. A) CONCATENATE B) PASTE C) PROPER D) TEXT
A) CONCATENATE
13) The ________ function is used to count the number of cells in a range that meet one specified criterion. A) COUNTIF B) COUNT C) COUNTA D) COUNTIFS
A) COUNTIF
2) The nodes on the original Internet system were ________. A) Educational institutions B) military bases C) large corporations D) marketing companies
A) Educational institutions
10) Which of the following transmission media is NOT used to transmit signals on an Ethernet network? A) Topology B) Twisted-pair C) Fiber-optic D) Wi-Fi
A) Topology
20) In VBA, a programming ________ is a statement that documents what the code does. A) comment B) statement C) sub D) module
A) comment
22) Which generation of programming languages is closer to natural language but still requires some programming knowledge? A) Fourth-generation B) Third-generation C) Fifth-generation D) Second-generation
A) fourth-generation
30) ________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question. A) Fuzzy logic B) Expert systems C) Neural networks D) Neural logic
A) fuzzy logic
4) In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. A) analysis B) planning C) maintenance D) implementation
B) planning
13) ________ technologies use telephone lines to carry digital signals. A) FTTH B) DSL C) FiOS D) WiMAX
B) DSL
20) Machine language is written in ________. A) binary B) C++ C) assembly language D) Java
A) binary
24) A lookup function that returns a value from a list based on an index number is the ________ function. A) WEEKDAY B) SERIAL C) CHOOSE D) WORKDAY
D) WORKDAY
11) Programs that interpret HTML to display a webpage are called ________. A) interpreters B) translators C) compilers D) web browsers
D) Web Browsers
14) ________ is a general term used to describe a set of tools that change the values in cells to show how those changes affect the outcome of other formulas on a worksheet. A) Goal Seek B) Scenario Manager C) Scenario Summary D) What-if analysis
D) What-if analysis
23) ________ raises money from multiple small investors rather than a few large ones. A) Crowdresourcing B) Crowdbrowing C) Crowdfunding D) Crowdsourcing
C) Crowdfunding
6) ________ make data entry easier because they can be set up to match the layout of a paper document. A) Reports B) Records C) Forms D) Queries
C) Forms
17) Which of the following is NOT a type of programming error? A) Syntax B) Runtime C) Logic D) Grammatical
D) grammatical
5) If your computer has a ________, someone else can gain access to it undetected. A) zombie B) logic bomb C) rootkit D) botnet
C) rootkit
17) In the URL http://www.irs.gov, irs is the ________. A) TLD B) protocol C) subdomain D) domain name
D) Domain name
4) To display records in a table that meet certain criteria, you would apply a ________. A) sort B) delimiter C) column D) filter
D) Filter
4) You can change the user name for your copy of Excel in the ________ section in the Excel Options dialog box. A) Customize Ribbon B) Proofing C) Formulas D) General
D) General
1) A ________ is descriptive text that is added to worksheet cells without modifying the data. A) note B) comment C) revision D) callout
B) comment
18) The ________ function searches for a specific item in a range and returns the relative position of the item. A) LOOKUP B) INDEX C) SUBTOTAL D) MATCH
C) SUBTOTAL
17) The file extension used for a chart template is ________. A) .xml B) .xlsx C) .xltx D) .crtx
D) .crtx
21) 198.168.0.1 is an example of a(n) ________. A) protocol B) domain name C) DNS D) IP address
D) IP address
15) A ________ is a dynamic visual representation of data with fields assigned to the value and category axes. A) PivotTable B) query C) slicer D) PivotChart
D) PivotChart
14) A third-party program, such as Adobe Flash Player, is considered to be a(n) ________. A) toolbar B) add-on C) tab D) plug-in
D) Plug-in
23) Which device on a network performs network address translation? A) Repeater B) Router C) Splitter D) Hub
B) Router
18) ________ is a high-level programming language that can be used to write and modify macros. A) VBE B) VBA C) HTML D) XML
B) VBA
6) A message that informs a user about the types of data allowed in a cell is a(n) ________. A) data message B) input message C) error message D) validation message
B) input message
21) In Excel, you can use ________ to automate tasks. A) C++ B) macros C) Java D) HTML
B) macros
19) A ________ error is an error in programming design that results in an unexpected outcome. A) syntax B) grammatical C) logic D) runtime
C) logic
9) When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. A) To: B) Cc: C) Subject D) Bcc:
D) Bcc:
26) You can use a social ________ site to save and share your favorites online. A) news B) media marketing C) review D) bookmarking
D) Bookmarking
15) The process that combines the changes from multiple copies of a workbook into a single copy is called ________. A) Compare Files B) Track Changes C) Accept Changes D) Compare and Merge
D) Compare and Merge
7) ________ is an unlawful attack on computers or networks done to intimidate a government or its people. A) Cybercrime B) Computer fraud C) Cyber-stalking D) Cyber-terrorism
D) Cyber-terrorism
9) Wireless access points that are available in public spaces are called ________. A) Hyperlinks B) Network Access Points C) Internet protocols D) Hotspots
D) Hotspots
28) Which is an example of a social news site? A) Facebook B) Yelp C) LinkedIn D) reddit
D) Reddit
28) An Excel add-in used to find solutions to a complex problem to achieve a desired goal is ________. A) What-if analysis B) Goal Seek C) Scenario Manager D) Solver
D) Solver
2) A text function used to remove spaces from a string leaving a single space between words is the ________ function. A) MID B) CHOOSE C) TEXT D) TRIM
D) TRIM
7) In what phase of the SDLC does testing occur? A) implementation B) analysis C) maintenance D) design
D) design
19) A ________ connects two or more computers in a network. A) repeater B) hub C) router D) switch
D) switch
10) The ________ function returns a value of TRUE when at least one of the specified conditions is true. A) OR B) AND C) IF D) VLOOKUP
A) OR
17) ________ recommends music to you based on your listening preferences. A) Picasa B) Pandora C) Flickr D) SnapDragon
B) Pandora
21) When you set up your wireless router, you should change the ________, which is also called the wireless network name. A) WAP B) SSID C) NAT D) WEP
B) SSID
21) A chart ________ is a quantity for which the value is selected for particular circumstances. A) data series B) type C) template D) parameter
D) parameter
8) The result of a ________ function depends on whether a condition is true or false. A) Statistical B) Text C) Logical D) Financial
C) Logical
9) During the ________ phase of the SDLC, updates to the system may occur, bugs are fixed, and new features are added. A) implementation B) analysis C) maintenance D) design
C) maintenance
5) A ________ network is one that has at least one computer that provides centralized management, resources, and security. A) homegroup B) peer-to-peer C) workgroup D) client-server
D) client-server
11) A ________ is a device that connects two or more networks together. A) router B) hub C) switch D) modem
A) Router
23) The ________ function adds the cells in a range that meet one specified criterion. A) SUMIF B) SUM C) SUMIFS D) SUMA
A) SUMIF
18) The ________ must remain fixed in order to calculate the future value of an asset. A) interest rate B) principal C) period D) present value
A) interest rate
23) A(n) ________ is a control that is compatible with earlier versions of the program. A) legacy object B) ActiveX control C) button D) check box
A) legacy object
4) A ________ network is a network in which all computers are considered equal. A) peer-to-peer B) homegroup C) client-server D) workgroup
A) peer-to-peer
6) Before you can use the Subtotal tool to display summary statistics, you must ________ the column to be subtotaled. A) sort B) group C) total D) filter
A) sort
10) ________ can be used in a PivotTable report to visually separate the data. A) Row labels B) Banded columns C) Summary statistics D) Column labels
B) Banded columns
9) ________ hackers hack into systems to steal or vandalize. A) Red-hat B) Black-hat C) Gray-hat D) White-hat
B) Black-hat
8) To connect peripherals at short ranges, you would use the ________ wireless technology. A) Ultraviolet B) Bluetooth C) Infrared D) RFID
B) Bluetooth
16) The ________ feature prevents unauthorized users from making changes to a worksheet. A) Lock Cells B) Protect Sheet C) Protect Workbook D) Lock Sheet
B) Protect Sheet
22) The rules for communication between devices are called ________. A) firewalls B) protocols C) packets D) domains
B) Protocols
12) ________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax. A) Quasicode B) Pseudocode C) Virtual code D) Structured code
B) Pseudocode
29) Using social media to sell services is called ________. A) Short Message Service (SMS) B) Social media marketing (SMM) C) Secure Sockets Layer (SSL) D) Really Simple Syndication (RSS)
B) Social Media Marketing (SMM)
10) In a relational vehicle database, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle. A) simple query B) many-to-many C) one-to-one D) one-to-many
D) one-to-many
2) Each computer is considered equal in a ________ network. A) client-server B) wide area C) virtual private D) peer-to-peer
D) peer-to-peer
31) When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. A) B2B B) C2A C) A2C D) B2C
D)B2C
10) Hacking to make a political statement is called ________. A) politicking B) sneaking C) cracking D) hacktivism
D)hacktivism
25) An online environment for programming that allows development, testing, and deploying custom applications is called ________. A) client-side programming B) platform-as-a-service C) software-as-a-service D) server-side programming
B) platform-as-a-service
6) The ________ in a PivotTable use the values to categorize the data by rows. A) records B) row labels C) groups D) fields
B) row labels
2) In a database, a ________ stores data in rows and columns. A) field B) table C) cell D) matrix
B) table
22) The ________ feature allows you to define intervals at which to save copies of all open Excel files. A) AutoSave B) DocumentRecovery C) AutoRecover D) RecoverAll
C) AutoRecover
30) When one business provides services for another, it is a type of e-commerce called ________. A) C2B B) C2C C) B2B D) B2C
C) B2B
29) The process used by Excel to compute formulas and functions and display the results is called ________. A) computation B) solving C) calculation D) updating
C) Calculation
19) In VBA, a ________ is a set of instructions that is part of a program. A) comment B) statement C) sub D) module
C) sub
22) An array formula is enclosed in ________ brackets. A) ( ) B) [ ] C) { } D) " "
C) {}
4) When a formula contains the wrong type of data, the ________ error value occurs. A) #VALUE B) #NAME? C) #REF! D) #N/A
A) #VALUE
26) The function used to calculate the average of cells that meet multiple criteria is ________. A) AVERAGEIFS B) AVERAGE C) SUMIF D) AVERAGEIF
A) AVERAGIFS
32) ________ e-commerce allows anyone to sell or trade items online. A) C2C B) C2B C) B2C D) B2B
A) C2C
36) The # symbol used by Twitter is called a(n) ________. A) hashtag B) avatar C) forum D) digital footprint
A) hashtag
9) The ________ function returns a value of TRUE only when ALL specified conditions are true. A) OR B) AND C) IF D) VLOOKUP
B) AND
15) You would install a(n) ________ if you wanted to enable new capabilities in your web browser. A) toolbar B) add-on C) plug-in D) taskbar
B) Add-on
19) The ________ function defines categories and how data is aggregated in an OLAP cube. A) CUBE B) CUBEMEMBER C) CUBEVALUE D) Inquire
B) CUBEMEMBER
5) An email claiming that you have won a lottery might be an example of ________. A) cyberbullying B) computer fraud C) cyber-stalking D) cyber-harassmen
B) computer fraud
9) An Excel spreadsheet is an example of a(n) ________ database. A) object-oriented B) flat C) relational D) hierarchical
B) flat
8) A cell value that is referred to in a formula or function is a(n) ________ cell. A) argument B) precedent C) dependent D) relative
B) precedent
1) In a one-to-one relationship, both tables use the same ________ to link two records. A) query B) primary key C) foreign key D) form
B) primary key
6) If the referenced cells in a formula do not contain any data, the ________ error value occurs. A) #VALUE B) #NAME? C) #REF! D) #N/A
C) #REF!
25) When using Windows, to make changes, install hardware, or configure settings, you need to use the ________ account on your computer. A) client B) guest C) administrator D) master
C) administrator
30) GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface. A) sets B) information C) datacaches D) layers
D) layers
14) A ________ is a collection of table formatting options that can be applied to a range with a single click. A) thumbnail B) fill style C) style set D) table style
D) table style
11) The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________. A) methods B) channels C) connections D) media
D) Media
6) When the Internet backbone was privatized, five large ________ Access Points made up the new backbone. A) Ethernet B) Fiber C) Wireless D) Network
D) Network
11) A ________ in a PivotTable report is derived from formulas you create, which can include other PivotTable fields. A) row value B) summary statistic C) Value Field Setting D) calculated field
D) calculated field
3) A ________ contains the information for a single entity in the database. A) table B) record C) field D) cell
D) cell
22) A(n) ________ is a control that allows a user to select one or more values in a group of choices. A) legacy object B) ActiveX control C) button D) check box
D) check box
16) The rules that ensure the correct construction of coding commands in a programming language is called the ________. A) grammatical B) logic C) semantic D) syntax
D) syntax
22) To secure your wireless network at home, you should ________. A) back up the computers on the network B) password-protect important document files C) set the SSID to CLOSED D) use wireless encryption with a difficult passphrase
D) use wireless encryption with a difficult passphrase
22) Microsoft Office is an example of a(n) ________. A) geographic information system (GIS) B) office support system (OSS) C) transaction-processing system (TPS) D) Structured Query Language (SQL)
B) office support system (OSS)
19) A data ________ rule would prevent a user from entering text in a date/time field. A) manipulation B) validation C) monitoring D) redundancy
B) validation
16) Wi-Fi networks used in homes and public hotspots use the ________. A) W3C standards B) IEEE 802.11 standards C) POP protocols
B) IEEE 9802.11 standards
13) The ________ records all changes made to a workbook, who made the change, and when the data was changed. A) tracking log B) change history C) change tracking D) review log
B) change history
35) A Facebook ________ is used to promote an organization, a product, or a service. A) Page B) Account C) profile D) user
A) Page
16) A custom chart type that you can save and apply like any other chart type is a ________. A) chart template B) chart style C) dual axis chart D) chart sheet
A) chart template
27) When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar. A) https B) http C) shttp D) ssl
A) https
21) To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used. A) lookup B) Find feature C) master
A) lookup
16) You can use the ________ function to retrieve summary data from a PivotTable report. A) CUBEVALUE B) GETPIVOTDATA C) CUBE D) Slicer
B) GETPIVOTDATA
4) In a database, a ________ is the collection of related data that displays in a row. A) group B) record C) label D) field
B) Record
18) If you misspell a command word in a computer program, you have created a ________ error. A) runtime B) semantic C) syntax D) logic
B) semantic
5) If there is no match when a Lookup function is employed, the ________ error value occurs. A) #VALUE B) #NAME? C) #REF! D) #N/A
D) #N/A
10) ________ is the authoring language that defines the structure of a webpage. A) Hypertext B) User-generated content C) TLD D) HTML
D) HTML
22) Which organization coordinates the Internet naming system? A) FCC B) WWW C) W3C D) ICANN
D) ICANN
21) The ________ add-in assists with analyzing and reviewing workbooks to understand their design function and data dependencies. A) OLAP B) Power View C) Power Pivot D) Inquire
D) Inquire
12) What project was coordinated by the U.S. Department of Energy and the National Institutes of Health? A) ARPANET B) Integrated Automated Fingerprint Identification System C) Combined DNA Index System D) Human Genome Project
D) human genome project
10) The ________ feature is used to view changes in cells that are not visible in the worksheet. A) Trace Precedents B) Formula Auditing C) Data Table D) Watch Window
D) watch window
10) A trendline in which the data points create a symmetric arc is a(n) ________ trendline. A) Linear Forecast B) Moving Average C) Exponential D) Linear
C) Exponential
6) For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________. A) WAN B) MAN C) LAN D) PAN
C) LAN
13) A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices. A) PAN B) WLAN C) WAN D) MAN
C) WAN
15) In a dual axis chart, one or more data series can be plotted on a ________ axis. A) trendline B) primary vertical C) secondary vertical D) horizontal
C) secondary vertical
18) Antivirus software uses ________ to search for known viruses. A) virus checks B) stop-and-search checks C) definition date checks D) signature checking
D) signature checking
12) Which of the following is NOT a common LAN topology? A) Star B) Bus C) Hierarchical D) Ring
C) Hierarchial
24) Fifth-generation programming languages are primarily used in ________ applications. A) binary B) SaaS C) artificial intelligence D) webpage
C) artificial intelligence
23) Which is NOT a SQL relational keyword? A) WHERE B) QUIT C) FROM D) SELECT
B) Quit
8) The least expensive form of Internet connection is ________. A) DSL B) cable C) FTTH D) dial-up
D) Dial-up
16) In the URL http://www.irs.gov, http is the ________. A) TLD B) subdomain C) domain name D) protocol
D) Protocol
15) ________ is the largest online video-hosting site in the world. A) Flickr B) MySpace C) Skype D) YouTube
D) Youtube
20) A router is a form of security because it ________. A) scans your email for malicious content B) implements User Account Control (UAC) C) scans webpages before displaying the content D) acts like a firewall
D) acts like a firewall
14) In a virtual community, you can communicate with other people by using a(n) ________. A) captcha B) profile C) alias D) avatar
D) avatar
11) A ________ workbook is one in which multiple users on a network can make changes at the same time. A) shared B) collaborative C) network D) tracked
A) shared
5) ________ is an example of asynchronous communication. A) Skype B) Email C) Chat D) VoIP
B) Email
1) An Excel workbook can contain only one ________. A) transformation B) data model C) query D) data shape
B) data model
25) Wikis are designed for ________, which is allowing people to contribute more than just posting a response. A) collaboration B) expert opinions C) asynchronous communication D) synchronous communication
A) Collaboration
18) The backbone of the Internet is composed of numerous Internet ________ Points around the world. A) Exchange B) Connection C) Hyperlink D) Relay
A) Exchange
16) ________ is the largest online image-sharing site in the world. A) Flickr B) MySpace C) Skype D) LinkedIn
A) Flickr
27) The ________ function looks for a value in the top row of a table and returns a value from a row in the same column. A) VLOOKUP B) HLOOKUP C) INDEX D) ARRAY
A) HLOOKUP
1) Which of the following is a method of synchronous online communication? A) Instant Messaging B) Email C) Forum D) Newsgroup
A) Instant messaging
3) ________ allows you to communicate with one person at a time. A) Instant messaging B) Really Simple Syndication (RSS) C) User generated content D) Secure Sockets Layer (SSL)
A) Instant messaging
20) You can only share workbooks through the E-mail command in Excel if your organization uses ________. A) Outlook B) Gmail C) Yahoo! D) Hotmail
A) Outlook
17) ________ is an Excel add-in that is a powerful tool used for data analysis and to create data models. A) Power Pivot B) Power View C) PivotChart D) Inquire
A) Power Pivot
3) ________ data modifies the data from other data sources to meet your needs. A) Transforming B) Modeling C) Querying D) Combining
A) Transforming
17) A ________ appears to be a legitimate program, but is actually something malicious. A) Trojan horse B) worm C) rootkit D) botnet
A) Trojan horse
25) The ________ function takes a serial number value and returns the day of the week. A) WEEKDAY B) SERIAL C) CHOOSE D) WORKDAY
A) WEEKDAY
5) The desired output from the ________ phase of the SDLC is a list of requirements for a new system. A) analysis B) maintenance C) planning D) design
A) analysis
15) Network speeds are measured in ________ per second. A) bits B) hertz C) nanos D) bytes
A) bits
3) A ________ displays as a red triangle in the upper right corner of a cell. A) comment indicator B) locked cell C) tracked change D) flag
A) comment indicator
34) ________ is one of the most popular C2C websites. A) eBay B) Amazon C) Google Checkout D) PayPal
A) eBay
7) A message that informs a user that invalid data has been entered in a cell is a(n) ________. A) error alert B) validation message C) input message D) data message
A) error alert
10) The ________ Error alert is the most flexible and allows the user to just click OK to accept invalid data. A) Information B) Alert C) Warning D) Stop
A) information
1) The SDLC follows the development of a system from planning to the final stage, ________. A) maintenance B) implementation C) analysis D) design
A) maintenance
20) A data ________ defines the fields in a database and the type of data that each field contains. A) mine B) dictionary C) warehouse D) reference
A) mine
14) Data in a(n) ________ database are stored in data cubes. A) multidimensional B) relational C) hierarchical D) flat
A) multidimensional
31) Simulating human thinking by emulating the biological connections of the brain is called ________. A) a neural network B) biofeedback C) fuzzy logic D) an expert system
A) neural network
12) A ________ data table changes a value in a formula using input from either a row or a column. A) one-variable B) zero-variable C) two-variable D) variable
A) one-variable
3) In a delimited text file, each row ends with a ________. A) paragraph mark B) tab C) comma D) period
A) paragraph mark
10) The ________ a set of five steps that a programmer follows to create a computer program. A) Software Design Lifecycle B) Program Development Cycle C) Program Design Lifecycle D) Computer Programming Cycle
A) software design lifecycle
15) A small sample image of a style displayed in a gallery is a ________. A) thumbnail B) snapshot C) clip D) snip
A) thumbnail
17) Once a worksheet is protected, you must ________ any cells to which you want to allow changes. A) unlock B) lock C) protect D) unprotect
A) unlock
7) The PivotTable ________ display the summary statistics for the selected fields in the report. A) values B) row labels C) groups D) fields
A) values
20) Tweets are limited to ________ characters each. A) 50 B) 140 C) 230 D) 340
B) 140
8) A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer. A) password B) captcha C) signature D) verification
B) Captcha
24) When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. A) crowdresourcing B) crowdsourcing C) crowdsampling D) crowdreferencing
B) Crowdsourcing
1) The Internet was originally created as a communication system for the ________. A) Department of Education B) Department of Defense C) U.S. Congress D) University System
B) Department of Defense
5) In a database, title, author, publication date, and ISBN are examples of ________. A) records B) fields C) tables D) queries
B) Fields
20) A ________ can be set by an employer to prevent you from accessing eBay. A) switch B) firewall C) router D) wireless access point
B) Firewall
16) The ________ of an asset, such as an investment or a home, is its value at the end of a period of time. A) final value B) future value C) investment value D) present value
B) Future Value
19) Workbooks can be shared directly to ________ in Excel 2016 if you are logged into a Microsoft account. A) Save and Send B) OneDrive C) Google D) Dropbox
B) OneDrive
18) ________ is an Excel add-in that allows the user to interact with data and create visualizations and presentations. A) Power Pivot B) Power View C) PivotChart D) Inquire
B) Power View
21) Podcasts allow time ________, so you can listen on your own schedule. A) lagging B) shifting C) delay D) warping
B) Shifting
6) ________ technology is used for sending email messages. A) Forward-and-push B) Store-and-forward C) Get-and-put D) Push-and-pull
B) Store and forward
19) Most home routers also include a built-in ________. A) range extender B) switch C) hub D) network interface card
B) Switch
26) .com is an example of a(n) ________. A) DNS B) TLD C) LTE D) NAP
B) TLD
21) A(n) ________ formula would be used to calculate the sum of the values in one column multiplied by the sum of the values in another column. A) logical B) array C) lookup D) statistical
B) array
21) The INDEX function ________ returns a value from a location in a table or range of cells. A) table B) array C) reference D) name
B) array
16) A ________ changes your home page and redirects you to other websites. A) zombie B) browser hijacker C) rootkit D) botnet
B) browser hijacker
27) A(n) ________ improves over time by learning from its interactions. A) knowledge base B) cognitive computing system C) decision support system D) inference engine
B) cognitive computing system
5) Data can be sorted based on the ________ applied to each cell in a column. A) number formatting B) conditional formatting C) border color D) font
B) conditional formatting
11) A(n) ________ uses a range of cells to show how changing one or two values in a formula will affect the formula's result. A) Watch Window B) data table C) Outline pane D) Formula Audit
B) data table
1) A file in which the data in each column is separated by an identifying character such as a comma is a ________ text file. A) fixed B) delimited C) separated D) columnar
B) delimited
14) When data series in a chart have mixed types of data, you can use a ________ chart to plot a second value series. A) pie B) dual axis C) column D) bar
B) dual axis
18) The standard way that information in a file is encoded for storage is called the ________. A) file template B) file type C) software version D) worksheet template
B) file type
11) A graphic view of an algorithm is called a ________. A) structure chart B) flowchart C) Venn diagram D) Gantt chart
B) flowchart
17) ________ is a what-if analysis tool that finds a specific value for a cell by adjusting the value of another cell. A) Formula Auditing B) Goal Seek C) Trace Precedents D) Convert Table to Range
B) goal seek
7) Subtotaled data is displayed as a(n) ________ with three levels. A) chart B) group C) outline D) table
B) group
29) The ________ was created in an effort to make it easier for victims to report cybercrimes. A) USA PATRIOT Act B) Internet Crime Complaint Center C) Homeland Security Act D) Computer Fraud and Abuse Act
B) internet crime complaint center
14) Which statement about a logic bomb is FALSE? A) They are often planted by disgruntled IT workers. B) It can spread to other machines. C) It can lay dormant until specific conditions are met. D) It can be triggered on a specific date.
B) it can spread to other machines
25) An expert system is a computer programmed to ________. A) use SQL statements to respond to requests B) make decisions in real-life situations C) search the web for experts D) present possible decision outcomes
B) make decisions in real-life situations
4) Clickjacking results in ________. A) sending spam to your friends' email accounts B) malware posting unwanted links on your Facebook page C) you sending money to get more money in return D) your Facebook account being closed without your knowledge
B) malware posting unwanted links on your Facebook page
1) In Excel, a file that is not the current Excel 2016 format is a ________ file. A) text B) non-native C) binary D) native
B) non-native
13) Another name for the actual attack caused by a virus is a ________. A) worm B) payload C) logic bomb D) hoax
B) payload
17) The future value of an asset can be calculated when ________ are constant over time. A) investments B) payments C) withdrawals D) deposits
B) payments
16) The ________ database is the most popular type used by businesses. A) hierarchical B) relational C) multidimensional D) flat
B) relational
17) If you want to connect your home network to the Internet, you will need a ________ in addition to a modem. A) repeater B) router C) terminator D) switch
B) router
23) A(n) ________ can be used in or returned by a function to indicate the position of a value in a series. A) parameter B) serial number C) auto number D) index
B) serial number
14) A tool used with a PivotTable to filter data based on distinct values in columns is a ________. A) timeline B) slicer C) calculated field D) group
B) slicer
4) Which would make the best primary key in a table? A) Last name B) Social Security number C) First name D) Street Address
B) social security number
24) You should use a(n) ________ account for everyday computing on a computer running Windows. A) guest B) standard C) visitor D) administrator
B) standard
18) A ________ is a device that connects multiple devices on a LAN. A) bus B) switch C) router D) repeater
B) switch
8) To print data or display it in an easy to read format, a ________ can be used. A) report B) table C) record D) form
B) table
11) A prebuilt workbook that already contains content and formatting which can be used as a pattern to create a new workbook is a ________. A) trendline B) template C) chart D) consolidation
B) template
9) A ________ is an object that can be inserted on a worksheet to provide additional information. A) caption B) text box C) cell D) range
B) text box
3) What was the ARPANET? A) A project of the Department of Transportation B) The origins of the Internet C) A network of two computers D) A network originally authorized by President Truman
B) the origins of the internet
19) The FTP protocol is used to ________. A) log in to a secure webpage B) transfer files C) surf the web D) verify an email address
B) transfer files
12) The difference between a virus and a worm is a ________. A) worm is a threat to your computer, but a virus is not B) virus needs a host file, but a worm does not C) virus replicates itself, but a worm cannot self-replicate D) virus is a threat to your computer, but a worm is not
B) virus needs a host file, but a worm does not
20) If loan payments will be made monthly for 10 years, ________ should be entered as the Nper argument in the FV function. A) 1 B) 10 C) 120 D) 12
C) 120
19) If the annual interest rate of a loan is 5% and you want to calculate the interest rate for each monthly payment, you would enter ________ as the Rate argument in the FV function. A) 5% B) 5% * 12 C) 5% / 12 D) - 5%
C) 5% /12
24) Which operator is used to return results that includes two specific words? A) NOT B) BUT C) AND D) OR
C) AND
4) ________ communication allows you to send a message to someone who is not online at the same time. A) Static B) Dynamic C) Asynchronous D) Synchronous
C) Asynchronous
29) ________ is the application of information technology to the field of biology. A) Biofeedback B) Biocoenosis C) Bioinformatics D) Bioengineering
C) Bioinformatics
12) The ________ function is used to count the number of cells in a range that are not blank. A) COUNTIF B) COUNT C) COUNTA D) COUNTIFS
C) COUNTA
20) The ________ function defines the values derived from the cross-tabulation of the categories in an OLAP cube. A) CUBE B) CUBEMEMBER C) CUBEVALUE D) Inquire
C) CUBEVALUE
12) The ________ command is used to summarize and report results from separate worksheets. A) Subtotal B) Group C) Consolidate D) Outline
C) Consolidate
23) The ________ enables users to enter a friendly name like whitehouse.gov instead of an address like 74.125.224.72. A) IP B) TLD C) DNS D) ISP
C) DNS
7) Which broadband service are you likely to use if you live in a very remote area? A) Cable B) Satellite C) DSL D) Fiber
C) DSL
5) ________ rules place restrictions on the types of data that can be entered into cells. A) Data protection B) Data type C) Data validation D) Proofing
C) Data Validation
14) The ________ worksheet displays the entire change history and does not display again when the workbook is closed and reopened. A) Review B) Changes C) History D) Tracking
C) History
7) Which statement about email is FALSE? A) Copies of your email may exist on several servers even after the recipient deletes it. B) Your employer may read your email at your work. C) It cannot be accessed by hackers. D) Email can be used for targeted marketing
C) It cannot be accessed by hackers
27) Which of the following is a client-side programming technology? A) Perl B) PHP C) JavaScript D) JSP
C) JavaScript
13) ________ is a social network that is designed for business connections. A) Facebook B) Twitter C) LinkedIn D) Yahoo!
C) LinkedIn
7) A trendline that has data points following a smooth curve to show data fluctuations is a(n) ________ trendline. A) Exponential B) Linear C) Moving Average D) Linear Forecast
C) Moving Average
25) Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi. A) Broadband B) Regional C) Municipal D) Corporate
C) Municipal
15) ________ allows the user to selectively extract data from different viewpoints. A) An office support system (OSS) B) A transaction-processing system (TPS) C) Online analytical processing (OLAP) D) A decision support system (DSS)
C) Online analytical processing (OLAP)
2) The ________ function is used to capitalize the first letter of each word of text. A) PASTE B) CONCATENATE C) PROPER D) TEXT
C) PROPER
22) You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds. A) NSS B) DNS C) RSS D) PSS
C) RSS
24) The ________ function adds the cells in a range that meet multiple criteria. A) SUM B) SUMA C) SUMIFS D) SUMIF
C) SUMIFS
11) ________ functions are used to describe a collection of data such as totals, counts, and averages. A) Logical B) Text C) Statistical D) Financial
C) Statistical
9) In a PivotTable report, the default statistic that is calculated for each group is a(n) ________. A) average B) count C) total D) maximum
C) Total
19) ________ is an example of a microblogging site that allows a limited number of characters in a post. A) The Blogosphere B) Blogger C) Twitter D) Flickr
C) Twitter
14) Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. A) PAN B) LAN C) VPN D) WLAN
C) VPN
7) In a WLAN, devices are connected by ________. A) ultraviolet B) Bluetooth C) Wi-Fi D) RFID
C) Wi-Fi
33) What happens when you click the padlock icon on a webpage? A) You can turn off the security setting of the website. B) You can turn on the security setting of the website. C) You can get a security report about the website. D) There is no padlock icon on a webpage.
C) You can get a security report about the website
15) Procedural programming involves ________. A) writing executable pseudocode B) defining objects and the actions that can be performed on them C) a step-by-step list of instructions D) drawing flowcharts to ensure that procedures are followed
C) a step-by-step list of instructions
28) Knowledge engineers develop ________, which are programmed to make decisions in real-life situations. A) fuzzy logic B) clones C) knowledge bases D) expert systems
C) knowledge bases
28) In an office acceptable use policy (AUP), which of the following might be prohibited? A) Checking work email B) Purchasing business supplies online C) Logging in to eBay D) Viewing an associate's electronic calendar
C) logging in to eBay
3) Which is the correct order of the phases in the SDLC? A) Requirements, analysis, design, implementation and testing, maintenance B) Requirements, planning, design, implementation, testing C) Planning, analysis, design, implementation and testing, maintenance D) Planning, requirements, design, implementation, testing
C) planning, analysis, design, implementation and testing, maintenance
7) A ________ could be used to retrieve all the phone numbers from a student database. A) table B) report C) query D) form
C) query
18) Which is NOT an advantage of data normalization? A) Makes it easier to update records B) Increases query speed C) Reduces the database size D) Increases database development time
C) reduces the database size
20) The INDEX function ________ returns the reference of a cell at the intersection of a specified row and column. A) table B) array C) reference D) name
C) reference
11) Which statement about cookies is FALSE? A) They are used by websites to identify you. B) It is a small text file. C) They cannot collect information you do not want to share. D) They can be installed without your knowledge.
C) they cannot collect information you do not want to share
23) C++ is an example of a ________-generation language. A) fourth B) fifth C) third D) second
C) third
13) A ________ data table changes one value in a formula using one input from a column and one input from a row. A) one-variable B) zero-variable C) two-variable D) variable
C) two-variable
8) When the data validation Error alert is set to ________, the user is given the option to proceed even if the data is invalid. A) Information B) Alert C) Warning D) Stop
C) warning
37) ________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results. A) RSS B) SMM C) SEO D) IM
C)SEO
25) The ________ function is used to calculate the average of a range of cells that meet one criterion. A) AVERAGEIFS B) AVERAGE C) AVG D) AVERAGEIF
D) AVERAGEIF
18) A ________ is similar to an online journal, in which you can write about anything you want to share. A) bulletin B) log C) chronicle D) blog
D) Blog
12) All the information someone can find out about you by searching the web is called your ________. A) avatar B) folksonomy C) tagged information D) digital footprint
D) Digital footprint
8) The PivotTable ________ pane is used to change fields from rows to columns, to add or remove fields, and to change the fields used to calculate values. A) Pivot B) Summary C) Values D) Fields
D) Fields
8) A trendline that has data points following a nearly straight line is a(n) ________ trendline. A) Linear Forecast B) Moving Average C) Exponential D) Linear
D) Linear
3) The ________ function returns a specified number of characters starting from a specified position in the data. A) LEFT B) TRIM C) RIGHT D) MID
D) MID
6) ________ redirects you to a phony website by hijacking a domain name. A) Phishing B) Clickjacking C) Shill bidding D) Pharming
D) Pharming
4) The ________ function returns a specified number of characters, starting from the right side of the data. A) LEFT B) MID C) TRIM D) RIGHT
D) RIGHT
15) A ________ is a set of values that Excel can save and substitute in cells to perform a what-if analysis. A) summary B) range C) goal D) scenario
D) Scenario
10) An email ________ is a block of text that is automatically put at the end of your messages. A) closing B) salutation C) identifier D) signature
D) Signature
27) ________ sites let users evaluate hotels, movies, games, books, and other products and services. A) Social bookmarking B) Really Simple Syndication C) Captcha D) Social review
D) Social Review
8) When a company pays people to hack into its own system, it calls in ________ hackers. A) green-hat B) black-hat C) gray-hat D) white-hat
D) White-hat
2) The cyberbullying of one adult by another adult, using a computer is known as ________. A) pharming B) phishing C) cyberbullying D) cyber-harassment
D) cyber-harassment
1) A database is a collection of ________ that has been organized in a meaningful way. A) spreadsheets B) files C) information D) data
D) data
31) GIS can be used by local municipalities to ________. A) capture criminals B) budget for waste management facilities C) warn citizens of weather-related events D) design emergency routes
D) design emergency routes
5) In a database, a ________ is a category of data organized in a column. A) record B) label C) group D) field
D) field
13) Which is a type of data that can be stored in an object-oriented database? A) Documents and spreadsheets B) Documents C) Spreadsheets D) Images, audio, and video
D) images, audio, and video
26) A(n) ________ is a set of rules that are used to apply a knowledge base to each situation. A) difference engine B) cognitive computing system C) decision support system D) inference engine
D) inference engine
17) The science and telecommunication industries would most likely use the ________ database type. A) multidimensional B) relational C) flat D) object-oriented
D) object-oriented
3) An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________. A) pharming B) cyber-stalking C) cyberbullying D) phishing
D) phishing
24) When you decide to use your neighbor's open wireless network without permission, you are ________. A) hacking B) trolling C) wardriving D) piggybacking
D) piggybacking
13) Worksheet data can be consolidated by ________. A) outline level B) columns or rows C) subtotals D) position or category
D) position or category
2) The process of applying transformations to data is known as ________ data. A) combining B) modeling C) querying D) shaping
D) shaping
21) In VBA, a programming ________ is a line of instructions in a sub. A) comment B) module C) sub D) statement
D) statement
9) When the data validation Error alert is set to ________, the user is prevented from entering invalid data in the cell. A) Information B) Alert C) Warning D) Stop
D) stop
2) A ________ file is one that stores only characters and no formatting. A) tabbed B) fixed C) flat D) text
D) text
28) Which is NOT a CODIS index? A) Arrestee B) Forensic C) Missing Persons D) Victims
D) victims
25) Moving through a neighborhood trying to locate open wireless access points is called ________. A) surfing B) trolling C) hacking D) wardriving
D) wardriving
2) The SDLC, the traditional model for system development, is also called the ________ approach. A) spiral B) whirlpool C) Gantt D) waterfall
D) waterfall
13) ________ is the process of converting an algorithm into a language the computer can understand. A) Debugging B) Flowcharting C) Coding D) Writing
C) Coding
30) The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information. A) USA PATRIOT B) Cyber Security Enhancement C) Computer Fraud and Abuse D) Cybersecurity
C) Computer Fraud and Abuse
1) Which cybercrime is considered to be a form of harassment? A) Pharming B) Clickjacking C) Cyber-stalking D) Phishing
C) Cyber-Stalking
23) The ________ protocol resolves the domain name amazon.com to an IP address. A) SMTP B) DHCP C) DNS D) FTP
C) DNS
2) A copy of Excel can be personalized by adding a(n) ________ in the Excel Options dialog box. A) property B) tag C) user name D) account
C) username
3) Which of the following statements about P2P networks is FALSE? A) They can only support a small number of devices. B) The services and security are centralized. C) All computers are considered equals. D) They can share a printer.
B) The services and security are centralized
12) Adding a browser ________ gives you quick access to the features of the application that installed it. A) add-on B) toolbar C) plug-in D) home page
B) Toolbar
7) The ________ function searches the first column in a table to find matching values. A) VALUE B) VLOOKUP C) MATCH D) HLOOKUP
B) VLOOKUP
2) A moderated chat room ensures that ________. A) parental controls are in effect B) all content is screened C) only subscribers participate D) no one under the age of 18 is online
B) all content is screened
16) A ________ can be applied to a table that can be used to reference the table in formulas or to select the table. A) style B) name C) range D) filter
B) name
3) PROPER(CONCATENATE(B2," ",C2)) is an example of a ________ function. A) combined B) nested C) layered D) string
B) nested
29) A doctor may use a(n) ________ to help diagnose an illness. A) knowledge base B) neural network C) expert system D) clone
B) neural network
20) The s in https stands for ________. A) sponsored B) secure C) system D) service
B) secured
1) P2P networks are normally found in ________. A) corporations B) universities C) homes D) libraries
C) homes
5) A ________ is a chart element used to identify the data series in the chart. A) title B) data point C) legend D) category
C) legend
26) Which of the following is a server-side programming technology? A) JavaScript B) ActiveX controls C) Java applets D) ASP
D) ASP
4) What is the Internet backbone? A) A company's main connection to the Internet B) The system of satellites that carry the Internet's signals C) The four original nodes of the Internet D) High speed connection between networks
D) high speed connection between networks
8) In what phase of the SDLC does user training take place? A) analysis B) planning C) maintenance D) implementation
D) implementation
14) When you define objects and the actions that can be performed on them, you are using ________ programming. A) procedural B) object-methodology C) algorithm D) object-oriented
D) object-orientated
6) In a column chart, a group of related columns represents a ________ in the chart. A) data series B) data point C) legend D) slice
A) data series
19) When using the MATCH function, a value of 0 for the Match_type argument will return the first value in the specified range that is ________ the Lookup_value. A) equal to B) greater than or equal to C) less than or equal to D) greater than
A) equal to
13) A plus sign next to a group in a PivotTable report is a(n) ________ icon. A) expand B) summary C) filter D) collapse
A) expand
5) The 4G network standard includes ________ technologies. A) FTTH B) DSL C) LTE D) FiOS
C) LTE
26) Which would be the strongest password? A) customer B) p22w0r6 C) p@55W0?d D) p@ssw*rd
C) p@55W0?d
9) One of the most important reasons for Ethernet standards is it ________. A) can prevent unauthorized users from accessing the Internet B) allows the government to keep tabs on what you are doing C) assures equipment from different manufacturers is compatible D) prevents overburdening your computer
C) assures equipment from different manufacturers in compatible
24) The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________. A) consistency B) isolation C) atomicity D) durability
C) atomicity
12) The Excel feature that allows reviewers to see the changes made by all reviewers is ________. A) merging B) collaboration C) change tracking D) comments
C) change tracking
24) A ________ is a control that runs a VBA macro when clicked. A) legacy object B) check box C) command button D) module
C) command button
9) A cell value that gets it value from the value in another cell is a(n) ________ cell. A) absolute B) precedent C) dependent D) relative
C) dependent
6) The ________ is the logical model of a new system. A) specification list B) system specification report C) design diagram D) requirement report
C) design diagram
21) A ________ is a network composed of a group of clients and servers under the control of one central security database. A) homegroup B) workgroup C) domain D) client
C) domain
12) ________ displays only the data that satisfies specified conditions. A) Sorting B) Expanding C) Filtering D) Collapsing
C) filtering