INFS Stewart Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

1) The ________ function is used to join the text from two or more cells into one cell. A) CONCATENATE B) PASTE C) PROPER D) TEXT

A) CONCATENATE

13) The ________ function is used to count the number of cells in a range that meet one specified criterion. A) COUNTIF B) COUNT C) COUNTA D) COUNTIFS

A) COUNTIF

2) The nodes on the original Internet system were ________. A) Educational institutions B) military bases C) large corporations D) marketing companies

A) Educational institutions

10) Which of the following transmission media is NOT used to transmit signals on an Ethernet network? A) Topology B) Twisted-pair C) Fiber-optic D) Wi-Fi

A) Topology

20) In VBA, a programming ________ is a statement that documents what the code does. A) comment B) statement C) sub D) module

A) comment

22) Which generation of programming languages is closer to natural language but still requires some programming knowledge? A) Fourth-generation B) Third-generation C) Fifth-generation D) Second-generation

A) fourth-generation

30) ________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question. A) Fuzzy logic B) Expert systems C) Neural networks D) Neural logic

A) fuzzy logic

4) In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. A) analysis B) planning C) maintenance D) implementation

B) planning

13) ________ technologies use telephone lines to carry digital signals. A) FTTH B) DSL C) FiOS D) WiMAX

B) DSL

20) Machine language is written in ________. A) binary B) C++ C) assembly language D) Java

A) binary

24) A lookup function that returns a value from a list based on an index number is the ________ function. A) WEEKDAY B) SERIAL C) CHOOSE D) WORKDAY

D) WORKDAY

11) Programs that interpret HTML to display a webpage are called ________. A) interpreters B) translators C) compilers D) web browsers

D) Web Browsers

14) ________ is a general term used to describe a set of tools that change the values in cells to show how those changes affect the outcome of other formulas on a worksheet. A) Goal Seek B) Scenario Manager C) Scenario Summary D) What-if analysis

D) What-if analysis

23) ________ raises money from multiple small investors rather than a few large ones. A) Crowdresourcing B) Crowdbrowing C) Crowdfunding D) Crowdsourcing

C) Crowdfunding

6) ________ make data entry easier because they can be set up to match the layout of a paper document. A) Reports B) Records C) Forms D) Queries

C) Forms

17) Which of the following is NOT a type of programming error? A) Syntax B) Runtime C) Logic D) Grammatical

D) grammatical

5) If your computer has a ________, someone else can gain access to it undetected. A) zombie B) logic bomb C) rootkit D) botnet

C) rootkit

17) In the URL http://www.irs.gov, irs is the ________. A) TLD B) protocol C) subdomain D) domain name

D) Domain name

4) To display records in a table that meet certain criteria, you would apply a ________. A) sort B) delimiter C) column D) filter

D) Filter

4) You can change the user name for your copy of Excel in the ________ section in the Excel Options dialog box. A) Customize Ribbon B) Proofing C) Formulas D) General

D) General

1) A ________ is descriptive text that is added to worksheet cells without modifying the data. A) note B) comment C) revision D) callout

B) comment

18) The ________ function searches for a specific item in a range and returns the relative position of the item. A) LOOKUP B) INDEX C) SUBTOTAL D) MATCH

C) SUBTOTAL

17) The file extension used for a chart template is ________. A) .xml B) .xlsx C) .xltx D) .crtx

D) .crtx

21) 198.168.0.1 is an example of a(n) ________. A) protocol B) domain name C) DNS D) IP address

D) IP address

15) A ________ is a dynamic visual representation of data with fields assigned to the value and category axes. A) PivotTable B) query C) slicer D) PivotChart

D) PivotChart

14) A third-party program, such as Adobe Flash Player, is considered to be a(n) ________. A) toolbar B) add-on C) tab D) plug-in

D) Plug-in

23) Which device on a network performs network address translation? A) Repeater B) Router C) Splitter D) Hub

B) Router

18) ________ is a high-level programming language that can be used to write and modify macros. A) VBE B) VBA C) HTML D) XML

B) VBA

6) A message that informs a user about the types of data allowed in a cell is a(n) ________. A) data message B) input message C) error message D) validation message

B) input message

21) In Excel, you can use ________ to automate tasks. A) C++ B) macros C) Java D) HTML

B) macros

19) A ________ error is an error in programming design that results in an unexpected outcome. A) syntax B) grammatical C) logic D) runtime

C) logic

9) When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. A) To: B) Cc: C) Subject D) Bcc:

D) Bcc:

26) You can use a social ________ site to save and share your favorites online. A) news B) media marketing C) review D) bookmarking

D) Bookmarking

15) The process that combines the changes from multiple copies of a workbook into a single copy is called ________. A) Compare Files B) Track Changes C) Accept Changes D) Compare and Merge

D) Compare and Merge

7) ________ is an unlawful attack on computers or networks done to intimidate a government or its people. A) Cybercrime B) Computer fraud C) Cyber-stalking D) Cyber-terrorism

D) Cyber-terrorism

9) Wireless access points that are available in public spaces are called ________. A) Hyperlinks B) Network Access Points C) Internet protocols D) Hotspots

D) Hotspots

28) Which is an example of a social news site? A) Facebook B) Yelp C) LinkedIn D) reddit

D) Reddit

28) An Excel add-in used to find solutions to a complex problem to achieve a desired goal is ________. A) What-if analysis B) Goal Seek C) Scenario Manager D) Solver

D) Solver

2) A text function used to remove spaces from a string leaving a single space between words is the ________ function. A) MID B) CHOOSE C) TEXT D) TRIM

D) TRIM

7) In what phase of the SDLC does testing occur? A) implementation B) analysis C) maintenance D) design

D) design

19) A ________ connects two or more computers in a network. A) repeater B) hub C) router D) switch

D) switch

10) The ________ function returns a value of TRUE when at least one of the specified conditions is true. A) OR B) AND C) IF D) VLOOKUP

A) OR

17) ________ recommends music to you based on your listening preferences. A) Picasa B) Pandora C) Flickr D) SnapDragon

B) Pandora

21) When you set up your wireless router, you should change the ________, which is also called the wireless network name. A) WAP B) SSID C) NAT D) WEP

B) SSID

21) A chart ________ is a quantity for which the value is selected for particular circumstances. A) data series B) type C) template D) parameter

D) parameter

8) The result of a ________ function depends on whether a condition is true or false. A) Statistical B) Text C) Logical D) Financial

C) Logical

9) During the ________ phase of the SDLC, updates to the system may occur, bugs are fixed, and new features are added. A) implementation B) analysis C) maintenance D) design

C) maintenance

5) A ________ network is one that has at least one computer that provides centralized management, resources, and security. A) homegroup B) peer-to-peer C) workgroup D) client-server

D) client-server

11) A ________ is a device that connects two or more networks together. A) router B) hub C) switch D) modem

A) Router

23) The ________ function adds the cells in a range that meet one specified criterion. A) SUMIF B) SUM C) SUMIFS D) SUMA

A) SUMIF

18) The ________ must remain fixed in order to calculate the future value of an asset. A) interest rate B) principal C) period D) present value

A) interest rate

23) A(n) ________ is a control that is compatible with earlier versions of the program. A) legacy object B) ActiveX control C) button D) check box

A) legacy object

4) A ________ network is a network in which all computers are considered equal. A) peer-to-peer B) homegroup C) client-server D) workgroup

A) peer-to-peer

6) Before you can use the Subtotal tool to display summary statistics, you must ________ the column to be subtotaled. A) sort B) group C) total D) filter

A) sort

10) ________ can be used in a PivotTable report to visually separate the data. A) Row labels B) Banded columns C) Summary statistics D) Column labels

B) Banded columns

9) ________ hackers hack into systems to steal or vandalize. A) Red-hat B) Black-hat C) Gray-hat D) White-hat

B) Black-hat

8) To connect peripherals at short ranges, you would use the ________ wireless technology. A) Ultraviolet B) Bluetooth C) Infrared D) RFID

B) Bluetooth

16) The ________ feature prevents unauthorized users from making changes to a worksheet. A) Lock Cells B) Protect Sheet C) Protect Workbook D) Lock Sheet

B) Protect Sheet

22) The rules for communication between devices are called ________. A) firewalls B) protocols C) packets D) domains

B) Protocols

12) ________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax. A) Quasicode B) Pseudocode C) Virtual code D) Structured code

B) Pseudocode

29) Using social media to sell services is called ________. A) Short Message Service (SMS) B) Social media marketing (SMM) C) Secure Sockets Layer (SSL) D) Really Simple Syndication (RSS)

B) Social Media Marketing (SMM)

10) In a relational vehicle database, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle. A) simple query B) many-to-many C) one-to-one D) one-to-many

D) one-to-many

2) Each computer is considered equal in a ________ network. A) client-server B) wide area C) virtual private D) peer-to-peer

D) peer-to-peer

31) When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. A) B2B B) C2A C) A2C D) B2C

D)B2C

10) Hacking to make a political statement is called ________. A) politicking B) sneaking C) cracking D) hacktivism

D)hacktivism

25) An online environment for programming that allows development, testing, and deploying custom applications is called ________. A) client-side programming B) platform-as-a-service C) software-as-a-service D) server-side programming

B) platform-as-a-service

6) The ________ in a PivotTable use the values to categorize the data by rows. A) records B) row labels C) groups D) fields

B) row labels

2) In a database, a ________ stores data in rows and columns. A) field B) table C) cell D) matrix

B) table

22) The ________ feature allows you to define intervals at which to save copies of all open Excel files. A) AutoSave B) DocumentRecovery C) AutoRecover D) RecoverAll

C) AutoRecover

30) When one business provides services for another, it is a type of e-commerce called ________. A) C2B B) C2C C) B2B D) B2C

C) B2B

29) The process used by Excel to compute formulas and functions and display the results is called ________. A) computation B) solving C) calculation D) updating

C) Calculation

19) In VBA, a ________ is a set of instructions that is part of a program. A) comment B) statement C) sub D) module

C) sub

22) An array formula is enclosed in ________ brackets. A) ( ) B) [ ] C) { } D) " "

C) {}

4) When a formula contains the wrong type of data, the ________ error value occurs. A) #VALUE B) #NAME? C) #REF! D) #N/A

A) #VALUE

26) The function used to calculate the average of cells that meet multiple criteria is ________. A) AVERAGEIFS B) AVERAGE C) SUMIF D) AVERAGEIF

A) AVERAGIFS

32) ________ e-commerce allows anyone to sell or trade items online. A) C2C B) C2B C) B2C D) B2B

A) C2C

36) The # symbol used by Twitter is called a(n) ________. A) hashtag B) avatar C) forum D) digital footprint

A) hashtag

9) The ________ function returns a value of TRUE only when ALL specified conditions are true. A) OR B) AND C) IF D) VLOOKUP

B) AND

15) You would install a(n) ________ if you wanted to enable new capabilities in your web browser. A) toolbar B) add-on C) plug-in D) taskbar

B) Add-on

19) The ________ function defines categories and how data is aggregated in an OLAP cube. A) CUBE B) CUBEMEMBER C) CUBEVALUE D) Inquire

B) CUBEMEMBER

5) An email claiming that you have won a lottery might be an example of ________. A) cyberbullying B) computer fraud C) cyber-stalking D) cyber-harassmen

B) computer fraud

9) An Excel spreadsheet is an example of a(n) ________ database. A) object-oriented B) flat C) relational D) hierarchical

B) flat

8) A cell value that is referred to in a formula or function is a(n) ________ cell. A) argument B) precedent C) dependent D) relative

B) precedent

1) In a one-to-one relationship, both tables use the same ________ to link two records. A) query B) primary key C) foreign key D) form

B) primary key

6) If the referenced cells in a formula do not contain any data, the ________ error value occurs. A) #VALUE B) #NAME? C) #REF! D) #N/A

C) #REF!

25) When using Windows, to make changes, install hardware, or configure settings, you need to use the ________ account on your computer. A) client B) guest C) administrator D) master

C) administrator

30) GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface. A) sets B) information C) datacaches D) layers

D) layers

14) A ________ is a collection of table formatting options that can be applied to a range with a single click. A) thumbnail B) fill style C) style set D) table style

D) table style

11) The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________. A) methods B) channels C) connections D) media

D) Media

6) When the Internet backbone was privatized, five large ________ Access Points made up the new backbone. A) Ethernet B) Fiber C) Wireless D) Network

D) Network

11) A ________ in a PivotTable report is derived from formulas you create, which can include other PivotTable fields. A) row value B) summary statistic C) Value Field Setting D) calculated field

D) calculated field

3) A ________ contains the information for a single entity in the database. A) table B) record C) field D) cell

D) cell

22) A(n) ________ is a control that allows a user to select one or more values in a group of choices. A) legacy object B) ActiveX control C) button D) check box

D) check box

16) The rules that ensure the correct construction of coding commands in a programming language is called the ________. A) grammatical B) logic C) semantic D) syntax

D) syntax

22) To secure your wireless network at home, you should ________. A) back up the computers on the network B) password-protect important document files C) set the SSID to CLOSED D) use wireless encryption with a difficult passphrase

D) use wireless encryption with a difficult passphrase

22) Microsoft Office is an example of a(n) ________. A) geographic information system (GIS) B) office support system (OSS) C) transaction-processing system (TPS) D) Structured Query Language (SQL)

B) office support system (OSS)

19) A data ________ rule would prevent a user from entering text in a date/time field. A) manipulation B) validation C) monitoring D) redundancy

B) validation

16) Wi-Fi networks used in homes and public hotspots use the ________. A) W3C standards B) IEEE 802.11 standards C) POP protocols

B) IEEE 9802.11 standards

13) The ________ records all changes made to a workbook, who made the change, and when the data was changed. A) tracking log B) change history C) change tracking D) review log

B) change history

35) A Facebook ________ is used to promote an organization, a product, or a service. A) Page B) Account C) profile D) user

A) Page

16) A custom chart type that you can save and apply like any other chart type is a ________. A) chart template B) chart style C) dual axis chart D) chart sheet

A) chart template

27) When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar. A) https B) http C) shttp D) ssl

A) https

21) To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used. A) lookup B) Find feature C) master

A) lookup

16) You can use the ________ function to retrieve summary data from a PivotTable report. A) CUBEVALUE B) GETPIVOTDATA C) CUBE D) Slicer

B) GETPIVOTDATA

4) In a database, a ________ is the collection of related data that displays in a row. A) group B) record C) label D) field

B) Record

18) If you misspell a command word in a computer program, you have created a ________ error. A) runtime B) semantic C) syntax D) logic

B) semantic

5) If there is no match when a Lookup function is employed, the ________ error value occurs. A) #VALUE B) #NAME? C) #REF! D) #N/A

D) #N/A

10) ________ is the authoring language that defines the structure of a webpage. A) Hypertext B) User-generated content C) TLD D) HTML

D) HTML

22) Which organization coordinates the Internet naming system? A) FCC B) WWW C) W3C D) ICANN

D) ICANN

21) The ________ add-in assists with analyzing and reviewing workbooks to understand their design function and data dependencies. A) OLAP B) Power View C) Power Pivot D) Inquire

D) Inquire

12) What project was coordinated by the U.S. Department of Energy and the National Institutes of Health? A) ARPANET B) Integrated Automated Fingerprint Identification System C) Combined DNA Index System D) Human Genome Project

D) human genome project

10) The ________ feature is used to view changes in cells that are not visible in the worksheet. A) Trace Precedents B) Formula Auditing C) Data Table D) Watch Window

D) watch window

10) A trendline in which the data points create a symmetric arc is a(n) ________ trendline. A) Linear Forecast B) Moving Average C) Exponential D) Linear

C) Exponential

6) For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________. A) WAN B) MAN C) LAN D) PAN

C) LAN

13) A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices. A) PAN B) WLAN C) WAN D) MAN

C) WAN

15) In a dual axis chart, one or more data series can be plotted on a ________ axis. A) trendline B) primary vertical C) secondary vertical D) horizontal

C) secondary vertical

18) Antivirus software uses ________ to search for known viruses. A) virus checks B) stop-and-search checks C) definition date checks D) signature checking

D) signature checking

12) Which of the following is NOT a common LAN topology? A) Star B) Bus C) Hierarchical D) Ring

C) Hierarchial

24) Fifth-generation programming languages are primarily used in ________ applications. A) binary B) SaaS C) artificial intelligence D) webpage

C) artificial intelligence

23) Which is NOT a SQL relational keyword? A) WHERE B) QUIT C) FROM D) SELECT

B) Quit

8) The least expensive form of Internet connection is ________. A) DSL B) cable C) FTTH D) dial-up

D) Dial-up

16) In the URL http://www.irs.gov, http is the ________. A) TLD B) subdomain C) domain name D) protocol

D) Protocol

15) ________ is the largest online video-hosting site in the world. A) Flickr B) MySpace C) Skype D) YouTube

D) Youtube

20) A router is a form of security because it ________. A) scans your email for malicious content B) implements User Account Control (UAC) C) scans webpages before displaying the content D) acts like a firewall

D) acts like a firewall

14) In a virtual community, you can communicate with other people by using a(n) ________. A) captcha B) profile C) alias D) avatar

D) avatar

11) A ________ workbook is one in which multiple users on a network can make changes at the same time. A) shared B) collaborative C) network D) tracked

A) shared

5) ________ is an example of asynchronous communication. A) Skype B) Email C) Chat D) VoIP

B) Email

1) An Excel workbook can contain only one ________. A) transformation B) data model C) query D) data shape

B) data model

25) Wikis are designed for ________, which is allowing people to contribute more than just posting a response. A) collaboration B) expert opinions C) asynchronous communication D) synchronous communication

A) Collaboration

18) The backbone of the Internet is composed of numerous Internet ________ Points around the world. A) Exchange B) Connection C) Hyperlink D) Relay

A) Exchange

16) ________ is the largest online image-sharing site in the world. A) Flickr B) MySpace C) Skype D) LinkedIn

A) Flickr

27) The ________ function looks for a value in the top row of a table and returns a value from a row in the same column. A) VLOOKUP B) HLOOKUP C) INDEX D) ARRAY

A) HLOOKUP

1) Which of the following is a method of synchronous online communication? A) Instant Messaging B) Email C) Forum D) Newsgroup

A) Instant messaging

3) ________ allows you to communicate with one person at a time. A) Instant messaging B) Really Simple Syndication (RSS) C) User generated content D) Secure Sockets Layer (SSL)

A) Instant messaging

20) You can only share workbooks through the E-mail command in Excel if your organization uses ________. A) Outlook B) Gmail C) Yahoo! D) Hotmail

A) Outlook

17) ________ is an Excel add-in that is a powerful tool used for data analysis and to create data models. A) Power Pivot B) Power View C) PivotChart D) Inquire

A) Power Pivot

3) ________ data modifies the data from other data sources to meet your needs. A) Transforming B) Modeling C) Querying D) Combining

A) Transforming

17) A ________ appears to be a legitimate program, but is actually something malicious. A) Trojan horse B) worm C) rootkit D) botnet

A) Trojan horse

25) The ________ function takes a serial number value and returns the day of the week. A) WEEKDAY B) SERIAL C) CHOOSE D) WORKDAY

A) WEEKDAY

5) The desired output from the ________ phase of the SDLC is a list of requirements for a new system. A) analysis B) maintenance C) planning D) design

A) analysis

15) Network speeds are measured in ________ per second. A) bits B) hertz C) nanos D) bytes

A) bits

3) A ________ displays as a red triangle in the upper right corner of a cell. A) comment indicator B) locked cell C) tracked change D) flag

A) comment indicator

34) ________ is one of the most popular C2C websites. A) eBay B) Amazon C) Google Checkout D) PayPal

A) eBay

7) A message that informs a user that invalid data has been entered in a cell is a(n) ________. A) error alert B) validation message C) input message D) data message

A) error alert

10) The ________ Error alert is the most flexible and allows the user to just click OK to accept invalid data. A) Information B) Alert C) Warning D) Stop

A) information

1) The SDLC follows the development of a system from planning to the final stage, ________. A) maintenance B) implementation C) analysis D) design

A) maintenance

20) A data ________ defines the fields in a database and the type of data that each field contains. A) mine B) dictionary C) warehouse D) reference

A) mine

14) Data in a(n) ________ database are stored in data cubes. A) multidimensional B) relational C) hierarchical D) flat

A) multidimensional

31) Simulating human thinking by emulating the biological connections of the brain is called ________. A) a neural network B) biofeedback C) fuzzy logic D) an expert system

A) neural network

12) A ________ data table changes a value in a formula using input from either a row or a column. A) one-variable B) zero-variable C) two-variable D) variable

A) one-variable

3) In a delimited text file, each row ends with a ________. A) paragraph mark B) tab C) comma D) period

A) paragraph mark

10) The ________ a set of five steps that a programmer follows to create a computer program. A) Software Design Lifecycle B) Program Development Cycle C) Program Design Lifecycle D) Computer Programming Cycle

A) software design lifecycle

15) A small sample image of a style displayed in a gallery is a ________. A) thumbnail B) snapshot C) clip D) snip

A) thumbnail

17) Once a worksheet is protected, you must ________ any cells to which you want to allow changes. A) unlock B) lock C) protect D) unprotect

A) unlock

7) The PivotTable ________ display the summary statistics for the selected fields in the report. A) values B) row labels C) groups D) fields

A) values

20) Tweets are limited to ________ characters each. A) 50 B) 140 C) 230 D) 340

B) 140

8) A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer. A) password B) captcha C) signature D) verification

B) Captcha

24) When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. A) crowdresourcing B) crowdsourcing C) crowdsampling D) crowdreferencing

B) Crowdsourcing

1) The Internet was originally created as a communication system for the ________. A) Department of Education B) Department of Defense C) U.S. Congress D) University System

B) Department of Defense

5) In a database, title, author, publication date, and ISBN are examples of ________. A) records B) fields C) tables D) queries

B) Fields

20) A ________ can be set by an employer to prevent you from accessing eBay. A) switch B) firewall C) router D) wireless access point

B) Firewall

16) The ________ of an asset, such as an investment or a home, is its value at the end of a period of time. A) final value B) future value C) investment value D) present value

B) Future Value

19) Workbooks can be shared directly to ________ in Excel 2016 if you are logged into a Microsoft account. A) Save and Send B) OneDrive C) Google D) Dropbox

B) OneDrive

18) ________ is an Excel add-in that allows the user to interact with data and create visualizations and presentations. A) Power Pivot B) Power View C) PivotChart D) Inquire

B) Power View

21) Podcasts allow time ________, so you can listen on your own schedule. A) lagging B) shifting C) delay D) warping

B) Shifting

6) ________ technology is used for sending email messages. A) Forward-and-push B) Store-and-forward C) Get-and-put D) Push-and-pull

B) Store and forward

19) Most home routers also include a built-in ________. A) range extender B) switch C) hub D) network interface card

B) Switch

26) .com is an example of a(n) ________. A) DNS B) TLD C) LTE D) NAP

B) TLD

21) A(n) ________ formula would be used to calculate the sum of the values in one column multiplied by the sum of the values in another column. A) logical B) array C) lookup D) statistical

B) array

21) The INDEX function ________ returns a value from a location in a table or range of cells. A) table B) array C) reference D) name

B) array

16) A ________ changes your home page and redirects you to other websites. A) zombie B) browser hijacker C) rootkit D) botnet

B) browser hijacker

27) A(n) ________ improves over time by learning from its interactions. A) knowledge base B) cognitive computing system C) decision support system D) inference engine

B) cognitive computing system

5) Data can be sorted based on the ________ applied to each cell in a column. A) number formatting B) conditional formatting C) border color D) font

B) conditional formatting

11) A(n) ________ uses a range of cells to show how changing one or two values in a formula will affect the formula's result. A) Watch Window B) data table C) Outline pane D) Formula Audit

B) data table

1) A file in which the data in each column is separated by an identifying character such as a comma is a ________ text file. A) fixed B) delimited C) separated D) columnar

B) delimited

14) When data series in a chart have mixed types of data, you can use a ________ chart to plot a second value series. A) pie B) dual axis C) column D) bar

B) dual axis

18) The standard way that information in a file is encoded for storage is called the ________. A) file template B) file type C) software version D) worksheet template

B) file type

11) A graphic view of an algorithm is called a ________. A) structure chart B) flowchart C) Venn diagram D) Gantt chart

B) flowchart

17) ________ is a what-if analysis tool that finds a specific value for a cell by adjusting the value of another cell. A) Formula Auditing B) Goal Seek C) Trace Precedents D) Convert Table to Range

B) goal seek

7) Subtotaled data is displayed as a(n) ________ with three levels. A) chart B) group C) outline D) table

B) group

29) The ________ was created in an effort to make it easier for victims to report cybercrimes. A) USA PATRIOT Act B) Internet Crime Complaint Center C) Homeland Security Act D) Computer Fraud and Abuse Act

B) internet crime complaint center

14) Which statement about a logic bomb is FALSE? A) They are often planted by disgruntled IT workers. B) It can spread to other machines. C) It can lay dormant until specific conditions are met. D) It can be triggered on a specific date.

B) it can spread to other machines

25) An expert system is a computer programmed to ________. A) use SQL statements to respond to requests B) make decisions in real-life situations C) search the web for experts D) present possible decision outcomes

B) make decisions in real-life situations

4) Clickjacking results in ________. A) sending spam to your friends' email accounts B) malware posting unwanted links on your Facebook page C) you sending money to get more money in return D) your Facebook account being closed without your knowledge

B) malware posting unwanted links on your Facebook page

1) In Excel, a file that is not the current Excel 2016 format is a ________ file. A) text B) non-native C) binary D) native

B) non-native

13) Another name for the actual attack caused by a virus is a ________. A) worm B) payload C) logic bomb D) hoax

B) payload

17) The future value of an asset can be calculated when ________ are constant over time. A) investments B) payments C) withdrawals D) deposits

B) payments

16) The ________ database is the most popular type used by businesses. A) hierarchical B) relational C) multidimensional D) flat

B) relational

17) If you want to connect your home network to the Internet, you will need a ________ in addition to a modem. A) repeater B) router C) terminator D) switch

B) router

23) A(n) ________ can be used in or returned by a function to indicate the position of a value in a series. A) parameter B) serial number C) auto number D) index

B) serial number

14) A tool used with a PivotTable to filter data based on distinct values in columns is a ________. A) timeline B) slicer C) calculated field D) group

B) slicer

4) Which would make the best primary key in a table? A) Last name B) Social Security number C) First name D) Street Address

B) social security number

24) You should use a(n) ________ account for everyday computing on a computer running Windows. A) guest B) standard C) visitor D) administrator

B) standard

18) A ________ is a device that connects multiple devices on a LAN. A) bus B) switch C) router D) repeater

B) switch

8) To print data or display it in an easy to read format, a ________ can be used. A) report B) table C) record D) form

B) table

11) A prebuilt workbook that already contains content and formatting which can be used as a pattern to create a new workbook is a ________. A) trendline B) template C) chart D) consolidation

B) template

9) A ________ is an object that can be inserted on a worksheet to provide additional information. A) caption B) text box C) cell D) range

B) text box

3) What was the ARPANET? A) A project of the Department of Transportation B) The origins of the Internet C) A network of two computers D) A network originally authorized by President Truman

B) the origins of the internet

19) The FTP protocol is used to ________. A) log in to a secure webpage B) transfer files C) surf the web D) verify an email address

B) transfer files

12) The difference between a virus and a worm is a ________. A) worm is a threat to your computer, but a virus is not B) virus needs a host file, but a worm does not C) virus replicates itself, but a worm cannot self-replicate D) virus is a threat to your computer, but a worm is not

B) virus needs a host file, but a worm does not

20) If loan payments will be made monthly for 10 years, ________ should be entered as the Nper argument in the FV function. A) 1 B) 10 C) 120 D) 12

C) 120

19) If the annual interest rate of a loan is 5% and you want to calculate the interest rate for each monthly payment, you would enter ________ as the Rate argument in the FV function. A) 5% B) 5% * 12 C) 5% / 12 D) - 5%

C) 5% /12

24) Which operator is used to return results that includes two specific words? A) NOT B) BUT C) AND D) OR

C) AND

4) ________ communication allows you to send a message to someone who is not online at the same time. A) Static B) Dynamic C) Asynchronous D) Synchronous

C) Asynchronous

29) ________ is the application of information technology to the field of biology. A) Biofeedback B) Biocoenosis C) Bioinformatics D) Bioengineering

C) Bioinformatics

12) The ________ function is used to count the number of cells in a range that are not blank. A) COUNTIF B) COUNT C) COUNTA D) COUNTIFS

C) COUNTA

20) The ________ function defines the values derived from the cross-tabulation of the categories in an OLAP cube. A) CUBE B) CUBEMEMBER C) CUBEVALUE D) Inquire

C) CUBEVALUE

12) The ________ command is used to summarize and report results from separate worksheets. A) Subtotal B) Group C) Consolidate D) Outline

C) Consolidate

23) The ________ enables users to enter a friendly name like whitehouse.gov instead of an address like 74.125.224.72. A) IP B) TLD C) DNS D) ISP

C) DNS

7) Which broadband service are you likely to use if you live in a very remote area? A) Cable B) Satellite C) DSL D) Fiber

C) DSL

5) ________ rules place restrictions on the types of data that can be entered into cells. A) Data protection B) Data type C) Data validation D) Proofing

C) Data Validation

14) The ________ worksheet displays the entire change history and does not display again when the workbook is closed and reopened. A) Review B) Changes C) History D) Tracking

C) History

7) Which statement about email is FALSE? A) Copies of your email may exist on several servers even after the recipient deletes it. B) Your employer may read your email at your work. C) It cannot be accessed by hackers. D) Email can be used for targeted marketing

C) It cannot be accessed by hackers

27) Which of the following is a client-side programming technology? A) Perl B) PHP C) JavaScript D) JSP

C) JavaScript

13) ________ is a social network that is designed for business connections. A) Facebook B) Twitter C) LinkedIn D) Yahoo!

C) LinkedIn

7) A trendline that has data points following a smooth curve to show data fluctuations is a(n) ________ trendline. A) Exponential B) Linear C) Moving Average D) Linear Forecast

C) Moving Average

25) Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi. A) Broadband B) Regional C) Municipal D) Corporate

C) Municipal

15) ________ allows the user to selectively extract data from different viewpoints. A) An office support system (OSS) B) A transaction-processing system (TPS) C) Online analytical processing (OLAP) D) A decision support system (DSS)

C) Online analytical processing (OLAP)

2) The ________ function is used to capitalize the first letter of each word of text. A) PASTE B) CONCATENATE C) PROPER D) TEXT

C) PROPER

22) You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds. A) NSS B) DNS C) RSS D) PSS

C) RSS

24) The ________ function adds the cells in a range that meet multiple criteria. A) SUM B) SUMA C) SUMIFS D) SUMIF

C) SUMIFS

11) ________ functions are used to describe a collection of data such as totals, counts, and averages. A) Logical B) Text C) Statistical D) Financial

C) Statistical

9) In a PivotTable report, the default statistic that is calculated for each group is a(n) ________. A) average B) count C) total D) maximum

C) Total

19) ________ is an example of a microblogging site that allows a limited number of characters in a post. A) The Blogosphere B) Blogger C) Twitter D) Flickr

C) Twitter

14) Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. A) PAN B) LAN C) VPN D) WLAN

C) VPN

7) In a WLAN, devices are connected by ________. A) ultraviolet B) Bluetooth C) Wi-Fi D) RFID

C) Wi-Fi

33) What happens when you click the padlock icon on a webpage? A) You can turn off the security setting of the website. B) You can turn on the security setting of the website. C) You can get a security report about the website. D) There is no padlock icon on a webpage.

C) You can get a security report about the website

15) Procedural programming involves ________. A) writing executable pseudocode B) defining objects and the actions that can be performed on them C) a step-by-step list of instructions D) drawing flowcharts to ensure that procedures are followed

C) a step-by-step list of instructions

28) Knowledge engineers develop ________, which are programmed to make decisions in real-life situations. A) fuzzy logic B) clones C) knowledge bases D) expert systems

C) knowledge bases

28) In an office acceptable use policy (AUP), which of the following might be prohibited? A) Checking work email B) Purchasing business supplies online C) Logging in to eBay D) Viewing an associate's electronic calendar

C) logging in to eBay

3) Which is the correct order of the phases in the SDLC? A) Requirements, analysis, design, implementation and testing, maintenance B) Requirements, planning, design, implementation, testing C) Planning, analysis, design, implementation and testing, maintenance D) Planning, requirements, design, implementation, testing

C) planning, analysis, design, implementation and testing, maintenance

7) A ________ could be used to retrieve all the phone numbers from a student database. A) table B) report C) query D) form

C) query

18) Which is NOT an advantage of data normalization? A) Makes it easier to update records B) Increases query speed C) Reduces the database size D) Increases database development time

C) reduces the database size

20) The INDEX function ________ returns the reference of a cell at the intersection of a specified row and column. A) table B) array C) reference D) name

C) reference

11) Which statement about cookies is FALSE? A) They are used by websites to identify you. B) It is a small text file. C) They cannot collect information you do not want to share. D) They can be installed without your knowledge.

C) they cannot collect information you do not want to share

23) C++ is an example of a ________-generation language. A) fourth B) fifth C) third D) second

C) third

13) A ________ data table changes one value in a formula using one input from a column and one input from a row. A) one-variable B) zero-variable C) two-variable D) variable

C) two-variable

8) When the data validation Error alert is set to ________, the user is given the option to proceed even if the data is invalid. A) Information B) Alert C) Warning D) Stop

C) warning

37) ________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results. A) RSS B) SMM C) SEO D) IM

C)SEO

25) The ________ function is used to calculate the average of a range of cells that meet one criterion. A) AVERAGEIFS B) AVERAGE C) AVG D) AVERAGEIF

D) AVERAGEIF

18) A ________ is similar to an online journal, in which you can write about anything you want to share. A) bulletin B) log C) chronicle D) blog

D) Blog

12) All the information someone can find out about you by searching the web is called your ________. A) avatar B) folksonomy C) tagged information D) digital footprint

D) Digital footprint

8) The PivotTable ________ pane is used to change fields from rows to columns, to add or remove fields, and to change the fields used to calculate values. A) Pivot B) Summary C) Values D) Fields

D) Fields

8) A trendline that has data points following a nearly straight line is a(n) ________ trendline. A) Linear Forecast B) Moving Average C) Exponential D) Linear

D) Linear

3) The ________ function returns a specified number of characters starting from a specified position in the data. A) LEFT B) TRIM C) RIGHT D) MID

D) MID

6) ________ redirects you to a phony website by hijacking a domain name. A) Phishing B) Clickjacking C) Shill bidding D) Pharming

D) Pharming

4) The ________ function returns a specified number of characters, starting from the right side of the data. A) LEFT B) MID C) TRIM D) RIGHT

D) RIGHT

15) A ________ is a set of values that Excel can save and substitute in cells to perform a what-if analysis. A) summary B) range C) goal D) scenario

D) Scenario

10) An email ________ is a block of text that is automatically put at the end of your messages. A) closing B) salutation C) identifier D) signature

D) Signature

27) ________ sites let users evaluate hotels, movies, games, books, and other products and services. A) Social bookmarking B) Really Simple Syndication C) Captcha D) Social review

D) Social Review

8) When a company pays people to hack into its own system, it calls in ________ hackers. A) green-hat B) black-hat C) gray-hat D) white-hat

D) White-hat

2) The cyberbullying of one adult by another adult, using a computer is known as ________. A) pharming B) phishing C) cyberbullying D) cyber-harassment

D) cyber-harassment

1) A database is a collection of ________ that has been organized in a meaningful way. A) spreadsheets B) files C) information D) data

D) data

31) GIS can be used by local municipalities to ________. A) capture criminals B) budget for waste management facilities C) warn citizens of weather-related events D) design emergency routes

D) design emergency routes

5) In a database, a ________ is a category of data organized in a column. A) record B) label C) group D) field

D) field

13) Which is a type of data that can be stored in an object-oriented database? A) Documents and spreadsheets B) Documents C) Spreadsheets D) Images, audio, and video

D) images, audio, and video

26) A(n) ________ is a set of rules that are used to apply a knowledge base to each situation. A) difference engine B) cognitive computing system C) decision support system D) inference engine

D) inference engine

17) The science and telecommunication industries would most likely use the ________ database type. A) multidimensional B) relational C) flat D) object-oriented

D) object-oriented

3) An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________. A) pharming B) cyber-stalking C) cyberbullying D) phishing

D) phishing

24) When you decide to use your neighbor's open wireless network without permission, you are ________. A) hacking B) trolling C) wardriving D) piggybacking

D) piggybacking

13) Worksheet data can be consolidated by ________. A) outline level B) columns or rows C) subtotals D) position or category

D) position or category

2) The process of applying transformations to data is known as ________ data. A) combining B) modeling C) querying D) shaping

D) shaping

21) In VBA, a programming ________ is a line of instructions in a sub. A) comment B) module C) sub D) statement

D) statement

9) When the data validation Error alert is set to ________, the user is prevented from entering invalid data in the cell. A) Information B) Alert C) Warning D) Stop

D) stop

2) A ________ file is one that stores only characters and no formatting. A) tabbed B) fixed C) flat D) text

D) text

28) Which is NOT a CODIS index? A) Arrestee B) Forensic C) Missing Persons D) Victims

D) victims

25) Moving through a neighborhood trying to locate open wireless access points is called ________. A) surfing B) trolling C) hacking D) wardriving

D) wardriving

2) The SDLC, the traditional model for system development, is also called the ________ approach. A) spiral B) whirlpool C) Gantt D) waterfall

D) waterfall

13) ________ is the process of converting an algorithm into a language the computer can understand. A) Debugging B) Flowcharting C) Coding D) Writing

C) Coding

30) The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information. A) USA PATRIOT B) Cyber Security Enhancement C) Computer Fraud and Abuse D) Cybersecurity

C) Computer Fraud and Abuse

1) Which cybercrime is considered to be a form of harassment? A) Pharming B) Clickjacking C) Cyber-stalking D) Phishing

C) Cyber-Stalking

23) The ________ protocol resolves the domain name amazon.com to an IP address. A) SMTP B) DHCP C) DNS D) FTP

C) DNS

2) A copy of Excel can be personalized by adding a(n) ________ in the Excel Options dialog box. A) property B) tag C) user name D) account

C) username

3) Which of the following statements about P2P networks is FALSE? A) They can only support a small number of devices. B) The services and security are centralized. C) All computers are considered equals. D) They can share a printer.

B) The services and security are centralized

12) Adding a browser ________ gives you quick access to the features of the application that installed it. A) add-on B) toolbar C) plug-in D) home page

B) Toolbar

7) The ________ function searches the first column in a table to find matching values. A) VALUE B) VLOOKUP C) MATCH D) HLOOKUP

B) VLOOKUP

2) A moderated chat room ensures that ________. A) parental controls are in effect B) all content is screened C) only subscribers participate D) no one under the age of 18 is online

B) all content is screened

16) A ________ can be applied to a table that can be used to reference the table in formulas or to select the table. A) style B) name C) range D) filter

B) name

3) PROPER(CONCATENATE(B2," ",C2)) is an example of a ________ function. A) combined B) nested C) layered D) string

B) nested

29) A doctor may use a(n) ________ to help diagnose an illness. A) knowledge base B) neural network C) expert system D) clone

B) neural network

20) The s in https stands for ________. A) sponsored B) secure C) system D) service

B) secured

1) P2P networks are normally found in ________. A) corporations B) universities C) homes D) libraries

C) homes

5) A ________ is a chart element used to identify the data series in the chart. A) title B) data point C) legend D) category

C) legend

26) Which of the following is a server-side programming technology? A) JavaScript B) ActiveX controls C) Java applets D) ASP

D) ASP

4) What is the Internet backbone? A) A company's main connection to the Internet B) The system of satellites that carry the Internet's signals C) The four original nodes of the Internet D) High speed connection between networks

D) high speed connection between networks

8) In what phase of the SDLC does user training take place? A) analysis B) planning C) maintenance D) implementation

D) implementation

14) When you define objects and the actions that can be performed on them, you are using ________ programming. A) procedural B) object-methodology C) algorithm D) object-oriented

D) object-orientated

6) In a column chart, a group of related columns represents a ________ in the chart. A) data series B) data point C) legend D) slice

A) data series

19) When using the MATCH function, a value of 0 for the Match_type argument will return the first value in the specified range that is ________ the Lookup_value. A) equal to B) greater than or equal to C) less than or equal to D) greater than

A) equal to

13) A plus sign next to a group in a PivotTable report is a(n) ________ icon. A) expand B) summary C) filter D) collapse

A) expand

5) The 4G network standard includes ________ technologies. A) FTTH B) DSL C) LTE D) FiOS

C) LTE

26) Which would be the strongest password? A) customer B) p22w0r6 C) p@55W0?d D) p@ssw*rd

C) p@55W0?d

9) One of the most important reasons for Ethernet standards is it ________. A) can prevent unauthorized users from accessing the Internet B) allows the government to keep tabs on what you are doing C) assures equipment from different manufacturers is compatible D) prevents overburdening your computer

C) assures equipment from different manufacturers in compatible

24) The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________. A) consistency B) isolation C) atomicity D) durability

C) atomicity

12) The Excel feature that allows reviewers to see the changes made by all reviewers is ________. A) merging B) collaboration C) change tracking D) comments

C) change tracking

24) A ________ is a control that runs a VBA macro when clicked. A) legacy object B) check box C) command button D) module

C) command button

9) A cell value that gets it value from the value in another cell is a(n) ________ cell. A) absolute B) precedent C) dependent D) relative

C) dependent

6) The ________ is the logical model of a new system. A) specification list B) system specification report C) design diagram D) requirement report

C) design diagram

21) A ________ is a network composed of a group of clients and servers under the control of one central security database. A) homegroup B) workgroup C) domain D) client

C) domain

12) ________ displays only the data that satisfies specified conditions. A) Sorting B) Expanding C) Filtering D) Collapsing

C) filtering


Ensembles d'études connexes

Anatomy Unit 4 Lesson 1 Thoracic/Abdominal Muscles & Bones

View Set

hearing and the structure of the ear 100%

View Set

Properties and Uses of Unsaturated Hydrocarbons

View Set

français BI - questions mondiales: un monde en guerre

View Set

Exam 1 Corporate & Business Strategy

View Set