Intro to IT WGU Module 7- 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

First City Bank is preparing to roll out a new online banking system for its customers. Installing the new hardware and software has taken longer than expected, but the manager is confident customers will be thrilled with the new service. On the day of the launch, a seemingly minor programming error causes the system to shutdown and reboot each time the clock reaches a new hour. It takes about ten minutes for it to be up and running again. Which security goal is at risk? Confidentiality Integrity Availability

Availability

When one user is accessing some data and others are shut out of accessing that data, this is a problem for? Confidentiality Integrity Availability

Availability

Which of the following are characteristics of a packet-switched network? A. The path exists during the entire transmission, allowing communication in either direction to occur simultaneously. B. The choice of pathway is based on network availability and amount of message traffic. C. The route is established one branch at a time. D. A and B E. B and C

B and C

Which of the following is a characteristic of a packet-switched network? The full pathway for the message to reach its destination is established before the message is sent. Communication taking place between the same two computers may reach their destination using different pathways. Is the type of network used in most telephone lines.

Communication taking place between the same two computers may reach their destination using different pathways.

IP address aliases must be translated to IP addresses column in order for routers and devices to be identified. What is needed in order to make this translation? Domain name server Database server Any type of server E-mail server

Domain name server

Define Spyware

Downloaded to a computer while the user is viewing a website to track usage

What is required to verify authenticity of the recipient? Select three that apply. Encryption Certificates Anti-viral software Digital signatures

Encryption Certificates Digital signatures

IT personnel need to avoid redundancy when setting up security. True False

False

What is the typical bandwidth of today's networks? Kbps Bps Mbps to Gbps None of the above

Mbps to Gbps

In strategic risk analysis, which is the last step among the ones listed here? Determine threats Identify information assets Prioritize risks Identify vulnerabilities

Prioritize risks

What type of information can present a threat if disclosed such as social security numbers? Public Sensitive Private Confidential

Private

Entering data into the system accurately is an example of confidentiality. availability. integrity.

integrity.

All of the following are authentication except phishing. fingerprint. key card. password.

phishing.

A _____________ does the following: Does not return files, monitors requests, replies when a request is complete. FTP server print server database server

print server

Contains both the authentication proof and the encryption information needed to send secure information

A certificate authority

_________________ is computed from other data contained within an IP packet and stored as part of the IP packet. A gateway A checksum A DNS server table A Network Address Translation

A checksum

Define IP address

A series of numbers that indicates a specific internet location

Define Trojan Horse

A type of malware that attacks an individual computer by masquerading as an application

The _____ network topology is one of the least expensive.

Bus

Which of the following high-level programming languages was created to be business-oriented? SNOBOL LISP COBOL FORTRAN

COBOL

What is the primary tool used to connect to a network? Printer Wireless modem Computer Hand-held device

Computer

At the time of its creation, which of the following characteristics was unique to ENIAC? ENIAC used vacuum tubes for storage. ENIAC was an analog computer. ENIAC was a general-purpose computer. ENIAC used cables to connect components and run programs.

ENIAC was a general-purpose computer.

Buffer overflow, a technique used to attach computer systems is

Easily preventable

What is the most common type of local, physical network connection in use today? Coaxial and radio towers Radio towers and satellite Fiber optic cable and radio towers Fiber optic and UTP

Fiber optic and UTP

Which of the following type of transmission is paired correctly with the given media? Fiber optic cable - Electricity Coaxial cable - Radio waves Coaxial cable - Light impulses Fiber optic cable - Light impulses

Fiber optic cable - Light impulses

What prevents certain traffic from coming into and out of the network? Firewalls Anti-viral software Encryption Certificate authority

Firewalls

Which of the following statements is true of fourth generation computers? Graphical interfaces and a variety of new software increased computer usage. Early microcomputers provided vast computing capabilities. Transistor miniaturization occurred at a linear rate. The Mark 8 was more widely used than the Apple I.

Graphical interfaces and a variety of new software increased computer usage.

Maria is staring intently at the computer screen in front of her, her mind racing. She types in a few lines of code and sits back to see what happens. Yes! It is just as she thought! She has discovered a way to circumvent the security system of her company and gain access to all records without anyone knowing. Maria can also see an easy fix to this security glitch and she is surprised it hadn't already been implemented. Maria will receive a hefty bonus for finding this hole in security. That's her job! While Maria is in there, however, she decides to copy some personal information from the files of upper management. You just never know when it might come in handy! What type of hacking is described in this scenario? White-hat Gray-hat Black-hat

Gray-hat

In strategic risk analysis, what is the first step? Determine threats Identify information assets Prioritize risks Identify vulnerabilities

Identify information assets

Define Resource ID

Indicates the name of the file you are accessing or the location of the document on the server (i.e., /checking)

A _____ is a network that requires a router in order to communicate with the Internet

LAN

All of the following are parts of a URL except for: TLD Host name LAN Protocol

LAN

Define Network Worm

Malicious attack on an entire network

This device normally broadcasts messages to all ports. Network hub Router Switch All

Network hub

Margo is afraid she will forget her work login and password, so she keeps them on a sticky note in her top desk drawer. Is this an example of social engineering? Yes No

No

Networks can be used to organize and analyze data. Yes No

No - Networks share files but cannot analyze data

What is meant by a particular media bandwidth? The amount of data that can be transmitted over a unit of time, such as bits per second How long it takes for a device to connect to a server, webpage, or remote computer The amount of time required to connect to the internet in bps

The amount of data that can be transmitted over a unit of time, such as bits per second

Define Routers

The part of a device that reads the final destination of a piece of information and sends it across the correct path to reach it

Define Protocol

The set of rules by which the resource is transmitted (i.e., https://)

All of the following are true about access rights except: They include files that the user can access. They are part of the risk management plan. They are part of the IT policy.

They are part of the risk management plan.

The process of encryption involves

Transforming text into a scrambled, undecipherable message

The abbreviation "URL" indicates: Unified Reader Link Uniform Resource Locator Undetermined Resource Location United Rendering Lists

Uniform Resource Locator

Which of the following is not malware? Viruses Worms Trojan horse Unix

Unix

Social engineering targets _____

Users

Which of the following servers responds to HTTP requests on the Internet? Web server Print server FTP server File server

Web server

Define Packet Switching

When communication is broken into smaller pieces of data and sent separately across a network, often across different pathways

Networks can be used to share files that relate to the work being done by the contractors. Yes No

Yes - Team members can review files on the shared drive

Networks allow employees and contractors to share applications such as e-mail systems. Yes No

Yes - networks can share email between the employees and the contractors

A local area network (LAN) allows hardware sharing within one office. allows hardware sharing between two offices. allows software sharing between two offices.

allows hardware sharing within one office.

Ensuring that data is accessible and information is available when needed is an example of confidentiality. availability. integrity.

availability.

The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an example of availability. integrity. confidentiality.

confidentiality.

Learning about social engineering and how to protect passwords is an example of ___. access control education authentication

education

A _____________ does the following: Responds to client (computer) requests over the LAN, supports application software, shares data files. web server file server

file server

Which of the following is the best definition of a computer network? A computer network consists of a number of computers connected via a device that allows them to connect to the Internet. A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources. A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software. A computer network consists of one computer connected wirelessly to a printer.

A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.

How do virtual machines support a business computing ecosystem? A virtual machine (VM) is a server that users can log into and use different OSs and applications associated with the different OSs. A virtual machine (VM) is a whole separate physical computer that provides users access to an OS different from their primary computer. Being able to have access to a computer with a different OS facilitates collaboration in the business ecosystem. A virtual machine (VM) is made available by software and permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software. A virtual machine (VM) is a broadcasting device that facilitates communication across a network, thus supporting a business computing ecosystem.

A virtual machine (VM) is made available by software and permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software.

Which of the following statements describes the difference between a switch and a network hub? A network hub is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the IP address on the message. A switch is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers within the network. A network hub is a device that connects various networks together, while a switch is only able to connect computers and devices in a network. A switch is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the MAC address on the message. A network hub is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers. A switch is a device that connects various networks together, while a network hub is only able to connect computers and devices in a network.

A switch is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the MAC address on the message. A network hub is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers.

Which of the following is the best definition of a virtual machine? A virtual machine (VM) is a software emulator program that only allows a limited number of computer users to use multiple computers and multiple platforms at the same time. A virtual machine (VM) is a software emulator that increases a computer's ability to run software but only when using the same operating system. A virtual machine (VM) is a software emulator that allows users to experiment with different operating systems; however, additional computers must be purchased to run the different OSs. A virtual machine is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

A virtual machine is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.

This provides a means for devices and networks to communicate with each other and connect to devices in other networks. Network hub Router Switch All

All

Which of the following statements is not part of the path a message takes from one computer to another? A message is divided into one or more packets. All messages require a response from the destination machine to the sending device. The packet(s) are given the final destination address. All packets of the same message are combined together as they arrive.

All messages require a response from the destination machine to the sending device.

Which of the following is/are an example(s) of computer networks? Computer networks are a collection of hand-held devices connected via the Internet so that they can communicate with each other. Computer networks are a collection of computers and resources connected by various media so that they can communicate with each other. Computer networks are a collection of desktop computers and printers connected by cables to a central server so that they can communicate with each other. All of the above

All of the above

A business ecosystem consists of its interacting and interconnecting divisions or departments and partners of the company. retailers, manufacturers, and customers. hardware, software, and human resources. All of the above.

All of the above.

A computer network supports a business's ecosystem by improving efficiency. reducing costs. improving communication. All of the above.

All of the above.

Which of the following describes a denial of service (DOS) attack? An attacker floods the server with so many messages that the server cannot function properly. Hackers break into a database and send false information to users. A virus takes over the computer or system and prevents users from logging on.

An attacker floods the server with so many messages that the server cannot function properly.

Why would it be desirable to use a switch as opposed to a hub in a network? Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub. Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is more than that of a hub. Because a switch is a more powerful device, it can be used over longer distances compared to a hub.

Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub.

Which of the following statements is true of computer networks? Computer Networks are inherently secure. Computer networks allow individuals to share many types of resources. Computer networks are not useful unless they are connected to the internet. Computer networks allow individuals to share hardware such as printers, but not software.

Computer networks allow individuals to share many types of resources.

Which of the following statements is NOT a major development associated with the second generation of computers? Reduced physical size Computers became available for home use Larger main memory capacities External storage began shifting from tapes to disk drives

Computers became available for home use

Mary works for a large school district. Her responsibility is to monitor the site containing student attendance records. Mary has created an elaborate security system with unique identification numbers for each student. She has built in a number of security controls and is continually monitoring for unauthorized users. Each day, Mary takes two 10-minute breaks at exactly 10 a.m. and 3 p.m. Since she is gone such a short time she leaves whatever project she is working on up on her computer screen for anyone to see. Which security goal is at risk? Confidentiality Integrity Availability

Confidentiality

What part of information assurance and security (IAS) requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized individuals? Confidentiality Integrity Availability

Confidentiality

What is the possible role of the database server? Contains payment data Contains employee emails Contains the web pages for customers to access

Contains payment data

What is the possible role of the web server? Contains the web pages for customers to access. Contains payment data Contains employee emails.

Contains the web pages for customers to access.

In order to translate from an IP alias to an IP address, which of the following is used? Packet switching DNS Routers URL

DNS

Which of the following servers can generate reports from client queries? Web server File server Mail server Database server

Database server

How does a wide area network (WAN) enhance the business ecosystem? Select two that apply. Employees in different locations can share software. The network ensures privacy of customer information. Team members can review files on the shared drive synchronously. The network provides greater security.

Employees in different locations can share software. Team members can review files on the shared drive synchronously.

Your site's Internet point of presence is called a: Gateway DNS server table Router IP packet

Gateway

Which accurately describes the advantages of high-level programming languages over low-level programming languages? High-level languages make writing large, complex programs harder. High-level languages must be translated to machine code before they can be run. High-level languages use English words. High-level languages are more difficult to learn.

High-level languages use English words.

Which of the following best describes the purpose of hubs, switches and routers within a network? Hubs, switches, and routers are devices that provide points within a network where messages can be relayed to the computers and devices within the network. Hubs, switches, and routers are devices that forward messages to all ports on the network. Hubs, switches, and routers are devices that recognize the IP address of all devices on the network and relay messages only to the appropriate IP address. Hubs, switches, and routers are devices that route messages to other networks.

Hubs, switches, and routers are devices that provide points within a network where messages can be relayed to the computers and devices within the network.

www.google.com is an example of an _____

IP alias

Which is part of the definition of Domain Name? Indicates the location of a document on the server. Identifies the server on which a web page can be found. Reflects the set of rules by which a resource is transmitted. Indicates the name of the file or document being accessed.

Identifies the server on which a web page can be found.

What is the role of a client-server network in a business computing ecosystem? In a client-server network, each computer is equal to every other computer on the network. This facilitates the broadcasting of messages and thus, communication between elements in the business ecosystem. In a client-server network, software enables access to remote servers. This allows different parts of a business ecosystem to interact. In a client-server network, the server (or device) requests information from the client. These requests allow communication to flow across the business ecosystem. None of the above.

In a client-server network, software enables access to remote servers. This allows different parts of a business ecosystem to interact.

Which of the following was NOT a cause of the first generation of computers being unreliable? Inexpensive materials Vacuum tubes Programming difficulties related to connecting cables together

Inexpensive materials

SQL injection is a method used for

Inserting malicious commands into a system

Randy runs a small consulting firm and keeps all of his business contacts in a computer database. When Randy turns on his computer on Monday morning, he gets a weird error message. He calls in his IT specialist who determines their system has been infected with a virus. After hours of work, they think they have the customer database cleaned up, but occasionally, over the next few weeks, small errors still are being found. Which security goal is at risk? Confidentiality Integrity Availability

Integrity

What part of information assurance and security (IAS) requires that data is correct, data gathering ensures the accuracy of the data, data must be entered into the system accurately, and data modification must be tracked. Confidentiality Integrity Availability

Integrity

Which of the following describes a local computer? It is a computer that a person is physically at. It is a computer that is accessed over the network. It is often part of a computer network. Servers are often this type of computer.

It is a computer that a person is physically at.

Which of the following best describes the benefits of a star network topology? In a star network, every device has a point-to-point connection with every other device in the network. This allows any device to communicate with any other device. It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal. A star network requires a dedicated device (server, hub, or switch) which makes communication more efficient. All devices in a star network have a single point-to-point connection with the neighboring computers in the network.

It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal.

The _____ network topology includes a point-to-point connect between each device in the network

Mesh

IP address _____ that is used to send messages over the internet.

Method of breaking down communications

Which of the following technologies was introduced in the fourth generation of computers? Integrated circuits Microprocessors Disk drives Magnetic core memory

Microprocessors

Which of the following is a characteristic of a ring network topology? Messages can be sent in only one direction, it is very expensive, and it is difficult to add new devices. New devices can be easily added, however message transmission time may be longer based on the number of devices on the network. Requires a point-to-point connection between each device on the network, messages can be sent unidirectionally or bidirectionally, are similar in cost to the mesh network.

New devices can be easily added, however message transmission time may be longer based on the number of devices on the network.

Amazing Games LAN network can be used to share hardware among the employees in the PA office and the contractors. Yes No

No - Networks can share hardware only within an office

What is a method of obtaining a password when the data is sent over a network and the data is sent without encryption? SQL injections Buffer overflow Phishing Packet sniffing

Packet sniffing

Most computer networks, including the Internet, are _____.

Packet-Switched

Which of the following servers monitors requests, but doesn't send files in return? Web server FTP server File server Print server

Print server

Security classifications can be public, sensitive, private, or confidential. Information that can be found online or in the phone book is _____

Public

What will ensure proper storage so that data are available even when storage devices are damaged or offline? Redundancy Malware Encryption

Redundancy

Routers _____ until they reach a LAN

Route Messages

This device connects multiple networks together. Network hub Router Switch All

Router

Which device permits packet switching so that a message can be routed to the next link in a network? Router IP Address LAN DNS

Router

Which of the following communication system hardware devices is commonly used as a wireless access point? Radio waves Hub Switch Router

Router

Which of the following devices is used to connect one network to another network? Switch Router Hub

Router

machine. Three of the images are above the path, and three are underneath the path. This area is labeled LAN. What is the role of the switch in the network? Sends transmissions to all devices in a network Connects multiple networks together Sends radio waves over long distances Sends transmissions to a specific, intended computer

Sends transmissions to a specific, intended computer

What information is not public and will not be considered a threat to a person's privacy if others learned of it? Public Sensitive Private Confidential

Sensitive

Which of the following programming languages first introduced the concept of object-oriented programming? C C++ Smalltalk Simula

Smalltalk

Message traffic is not a problem with the _____ network topology

Star

Which of the following types of networks has each device in the network connected in a single point-to-point connection with a central HUB? Ring network Mesh network Bus network Star network

Star network

Which of the following types of information present a threat to someone's privacy? Secret business plans Names and addresses in the phone book Student ID and credit card numbers Phone numbers and e-mail addresses

Student ID and credit card numbers

This is commonly used to connect multiple computers together in such a way that messages are relayed to computers with the corresponding MAC address. Network hub Router Switch All

Switch

Requires that both parties in the communication have the same key

Symmetric key encryption

Which of the following best describes the Internet? In order to communicate over the Internet, a host does not need to run the IP network protocol. The Internet is a global network of networks. The Internet uses circuit switching. The Internet is an isolated computer network.

The Internet is a global network of networks.

Amazing Games is doing very well and they have customers around the world that want to buy their computer games. The sales force will need to collect the appropriate information from the customers and then share the information with others within the company. Which of the following DOES NOT describe how the network improves the process of the sales force at Amazing Games in this task? The network provides one database that stores all customer information reducing redundancy. The network allows any sales team member to access customer information. The network prevents hackers accessing secure information. The network provides up to date information on inventory and stock.

The network prevents hackers accessing secure information.

In a client-server network, what is the role of the server? The role of the server is to maintain connections to remote servers. The role of the server is the same as the role of the client because all of the computers on this type of network are equal. The role of the server is to take requests from the client and send back the requested information. The role of the server is to send out requests for information.

The role of the server is to take requests from the client and send back the requested information.

How do a router and switch differ when handling a message? The switch will purposefully drop messages if message traffic exceeds its capacity. There is no difference in how a router and a switch handle messages. The router will purposefully drop messages if message traffic exceeds its capacity. Both a router and a switch use the message's destination address to select the line to route the incoming message to.

The router will purposefully drop messages if message traffic exceeds its capacity.

What is the likely reason that the transmission from the firewall to the credit card processing cloud is sent through radio waves instead of coaxial or fiber optic cables? The transmission is carrying a lot of information. Transmission through radio waves is more secure. The transmission is long distance. The transmissions go through a firewall.

The transmission is long distance.

All of the following are true about biometrics except: They can be a fingerprint. They can be a voice identification match. They can be a unique identifier like a social security number.

They can be a unique identifier like a social security number.

Which of the following is NOT a characteristic of early operating systems? They used graphical interfaces. They required knowledge of relatively complex text commands. They could handle multiple user requests at a time. They had user protection and network security capabilities.

They used graphical interfaces.

Which factor contributed to the development of the first generation of computers? They were a response to the need to easily calculate missile trajectories. They were in demand by small organizations. They were seen as a valuable product for consumers. They had potential for business applications.

They were a response to the need to easily calculate missile trajectories.

During which generation did computers begin to see widespread use in business? First generation Fourth generation Third generation Second generation

Third generation

The two new pieces of hardware that symbolized the second generation computers included the ____________________ and the _______________________.

Transistor, Magnetic Core Memory

Which of the following statements is NOT accurate in describing the distinctions between first and second generation computers? The transistors used in the second generation computers were cheaper and lasted longer than the vacuum tubes of the first generation computers. Computers became smaller in size. In the second generation computers, memory was stored using a system composed of wires and magnetic cores. Transistors emitted more heat than vacuum tubes so a new type of material had to be used for the computer housing.

Transistors emitted more heat than vacuum tubes so a new type of material had to be used for the computer housing.

One type of virus is a _____. This type of virus completely replaces an existing application and takes the name of the taken over file. The Trojan horse pretends to be one piece of software, but is in fact another.

Trojan Horse

The firewall software contains a list of rules that describe the types of incoming messages that should either be permitted or blocked from a computer. True False

True

Which of the following will find vulnerabilities and fix or protect against them? Packet sniffing Phishing White-hat hacking Social engineering

White-hat hacking

Angelo is at a cocktail party. He gets in a conversation with an attractive woman who is very interested in his career. She asks detailed questions and expresses amazement at the importance of his position. She particularly focuses on how the company is able to keep their information secure. In his desire to impress the lady, Angelo is a little too free with his information. The next day, when he arrives at work, his file on a major account has been hacked. Is this an example of social engineering? Yes No

Yes

Felix receives an email on his work account indicating that he can get a large discount on a one-month pass at a new local gym - a deal said to be only available to a few select company employees. The email has been sent by the gym and does not include the company logo. If he is interested, he has 24 hours to purchase the deal. All he needs to do is send his name, address, and credit card information. Is this an example of social engineering? Yes No

Yes - Phishing

The ordering of packets is done by a DNS server table. IP. a higher-level TCP protocol.

a higher-level TCP protocol.

Challenges of using a computer network as a framework for the business ecosystem include cost, time to market, staying connected with customers. cost, software updates, increased access to data. need for specialized system, security breaches, communication with suppliers. cost and security.

cost and security.

Which statement best completes the sentence: Black-hat hackers ______________ hack for good purposes to find vulnerabilities and fix them. hack with malicious intent to commit crime or terrorism. hack both for good purposes and with malicious intent.

hack with malicious intent to commit crime or terrorism.

IP addresses _____ to facilitate communication over the internet

have English-like name aliases

Define Domain Name

identifies the server on which the web page can be found (i.e, abank.com)

Common characteristics of servers are greater hard disk storage, slower response time, single hard drives. larger hard disk drives for more storage, faster response time, more expensive. multiple hard disk drives, networked with other servers, lower cost. run VM software, allow for remote access, request information from other computers.

larger hard disk drives for more storage, faster response time, more expensive.

Complete the sentence: Public key encryption uses __________. one public key one public key & one private key two public keys one private key

one public key & one private key

In ___, roles are defined that include a list of access methods. education authentication role-based access control

role-based access control

The practice of packet sniffing involves

stealing unencrypted information

The role of the server in a business computing ecosystem is to determine the best path for messages. connect multiple networks within a wide area network. take requests from computers and respond with the requested information. running software for multiple OSs.

take requests from computers and respond with the requested information.

A _____________ does the following: Runs server side scripts, logs requests and errors, handles security. web server file server database server

web server

Access rights will prove who you are. may be provided by biometrics. are a password to log in. will include files that the user can access.

will include files that the user can access.


Set pelajaran terkait

FINC300 - CHAP 12 & 13 (LEARNSMART)

View Set

North Africa/SW Asia- Quiz 3 Uses of Geography

View Set

Chapter 3: Nutrition in the Body

View Set

Business Statistics Ch 15 & 16 (Week 7)

View Set

Financial Statement Analysis Ch. 11

View Set

GRADE 8 SPEAKING TOPIC FIRST SEMESTER

View Set

Nutrition Final Exam Review: Test 3

View Set