Lecture Exam #3
Which of the following are personal habits you can do to help ensure privacy? a) Be careful about posting PII b) Remove your virus checkers for your system c) ALWAYS respond to phishing d) Use encryption e) Change your passwords regularly
a) Be careful about posting PII d) Use encryption e) Change your passwords regularly
Which of these allows you to select a different bullet style? a) Bullet drop down menu b) Bullet styles c) Numbering d) List action
a) Bullet drop down menu
Which of the following are items you want to identify during the planning phase of putting together a presentation? a) Content expectations - purpose for the talk b) Grammar - correcting the grammar of the slides c) Type of talk - informal, formal, seminar d) Audience composition - general audience or specialists e) Time allowed for the talk
a) Content expectations - purpose for the talk c) Type of talk - informal, formal, seminar d) Audience composition - general audience or specialists e) Time allowed for the talk
Which of the following are steps to putting a presentation together? a) Create the presentation - in which you build the slide set b) Delete the presentation - in which you remove the unnecessary presentations from your audience c) Preparing - in which you gather your materials and lay out the sequence d) Planning - in which you clarify your subject and identify your audience
a) Create the presentation - in which you build the slide set c) Preparing - in which you gather your materials and lay out the sequence d) Planning - in which you clarify your subject and identify your audience
To create a table, select the cells you want to use and click which command? a) Format as Table b) Table-Maker c) Recreate as Table d) Convert
a) Format as Table
Which of the following are attributes you desire in possible visual aids to be used in a presentation? a) Simple and Clear b) Consistent with your message c) Consist of charts, graphs, pictures, videos d) Size the materials appropriately e) Must be laid out in a chronological order
a) Simple and Clear b) Consistent with your message c) Consist of charts, graphs, pictures, videos d) Size the materials appropriately
In the GCF Video over Applying Themes, the default theme that is applied when you open a document is: a) The default Office theme b) The default Windows theme c) The default PowerPoint theme d) The default Document theme
a) The default Office theme
In the GCF video over Inserting Videos, the video indicates that to make an excerpt of an audio piece, use which command? a) Trim Audio b) Edit Audio c) Cut Audio d) Make ande excreta
a) Trim Audio
A PivotTable allows you to summarize and further analyze your data in a table format. a) True b) False
a) True
A thesis statement of a presentation is a clear and concise statement of the problem being presented. a) True b) False
a) True
Bulleted lists break up the information into manageable pieces. a) True b) False
a) True
Clicking on the tiny star that appears next to the slide gives you a preview of your transition. a) True b) False
a) True
Goal Seek can be used to set one cell to a particular value by changing the value of a different cell. a) True b) False
a) True
You can add movement effects to text or objects using which tab? a) Review b) Design c) Movements d) Animation
d) Animation
To increase the size of your table, you can a) Double click the bottom right corner and enter the desired size b) Enter the desired size in the dialog box at the top of the screen c) Click the top left corner and drag to the desired side d) Click the bottom right corner and drag to the desired side.
d) Click the bottom right corner and drag to the desired side.
To reuse text that you already have within your presentation, you can use which of the following: a) Text manager b) Design Bar c) Format Tab d) Clipboard
d) Clipboard
You can change the length of time the transition takes by using a) Time Lapse b) Timing c) Clock Tick d) Duration
d) Duration
In the GCF video over Managing Slides, the video indicates that the view that completely fills the screen with what the audience will see when you present is called: a) Normal View b) Edit view c) Outline view d) Slideshow view
d) Slideshow view
The three categories of transitions are: a) Varied, Involved, Simple b) Inconspicuous, Conspicuous, content c) Large, Small, Crazy d) Subtle, Exciting, Dynamic Content
d) Subtle, Exciting, Dynamic Content
In computer security, authorization is which of the following? a) The act of ensuring the operation you are attempting to perform can be done safely b) The act of identifying yourself to the operation you are attempting to perform c) The act of identifying the operation you are attempting to perform d) The act of ensuring you have the permissions to perform the operation you are performing
d) The act of ensuring you have the permissions to perform the operation you are performing
In the GCF video over Inserting Videos, the video indicates that you can insert a video from your computer and from which of the following? a) Office.com b) YouTube c) Microsoft.com d) Web
d) Web
Match the sections of the a presentation to the idea behind them. Opening Body Summary Closing
- Tell them what you are going to tell them - Tell them - Tell them what you told them - Distribution of the materials, summing up questions
Match the term to the appropriate definition Security Privacy Malware
- The protection of information and property of theft, corruption, and natural disaster - Concerns the storing, repurposing etc. - Malicious software etc
Which of the following are steps you might perform during the preparation phase of creating a presentation? a) Identify your visual aids b) Identify questions you might be asked c) Identify the materials you are going to need d) Create a thesis statement e) Sequencing
All
In computer security, worms are considered to be a sub-class of a virus. The key difference is that worms have the capability to travel without human action. a) True b) False
a) True
In the GCF Video over Inserting Audio, the video indicates that you can insert audio from online, from your computer, or from recording. a) True b) False
a) True
In the GCF Video over Inserting Audio, the video indicates that you can insert audio from online, from your computer, or from recording. a) True b) False
a) True
In the GCF Video over Reviewing Presentations, the video indicates that Compare allows you to look at two different presentations and combine or edit them. a) True b) False
a) True
Just like a document, a presentation is intended to persuade or communicate. a) True b) False
a) True
Possession of a computer is considered a type of physical security - and is adequate for most of us. a) True b) False
a) True
Sorting T-Shirt sizes is best done using a custom sort that goes from small to x-large. a) True b) False
a) True
To create a PivotTable, click either one cells (if your data is already in a table) or the cell range (if you data is not a table) and then click the Pivot Table option. a) True b) False
a) True
Which of the following are considered to be threats under computer security? a) Virus b) User-consented Adware c) Spyware d) Worm e) Trojan Horse
a) Virus c) Spyware d) Worm e) Trojan Horse
What does VBA stand for (in Excel)? a) Visual Basic for Application b) Very Basic Application s c) Visual Basic Analysis d) Visual Button for Applications
a) Visual Basic for Application
In the GCF Video over Arranging Objects, how many different types of alignment of a set objects are presented? a) 2 b) 6 c) 5 d) 3
b) 6
Which of the following are true about creating a presentation? a) Mix and match your subscripts b) Avoid overuse of pronouns c) Put no more than one idea on a slide d) Spell check e) Use lots of formulas to back up your ideas
b) Avoid overuse of pronouns c) Put no more than one idea on a slide d) Spell check
Which of the following are true about using colors in a presentation? a) Colors are universal - people grasp the concert behind the colors quickly b) Each color should identify a concept c) Mix and match your colors to make the presentation vivid d) Similar colors may interact differently e) Be careful in using colors as a differentiator - 5-8% of the men in the world are color blind
b) Each color should identify a concept d) Similar colors may interact differently e) Be careful in using colors as a differentiator - 5-8% of the men in the world are color blind
Which of these is NOT one of the four categories for animations? a) Exit b) Exciting c) Entrance d) Motion Paths e) Emphasis
b) Exciting
A macro in Excel allows you to create new formulas and functions in your worksheet by combing ones you use often enough a) True b) False
b) False
Backups should be done infrequently because it is very expensive to perform backups these days. a) True b) False
b) False
Based on the above screen shot, a user entering invalid data in the selected cells will have the option to ignore the resulting data validation error. a) True b) False
b) False
Goal Seek will return the optimal value to set the selected cell to the desired value. a) True b) False
b) False
IF functions cannot be nested to allow multiple values to be tested a) True b) False
b) False
In the GCF Video over Reviewing Presentations, if the Notes pane is not present, it can be brought up by selecting the Notes tab from the ribbon. a) True b) False
b) False
One of the biggest threats to password security is social engineering, which are programs that use dictionary words and numbers to guess your password. a) True b) False
b) False
Pivot tables change the original input data table to reflect filtered and/or summarized data. a) True b) False
b) False
Since it is hard to identify what questions an audience might ask, you should have a general outline available for you to consult. a) True b) False
b) False
The NOT function returns True when given two arguments that evaluate to True. a) True b) False
b) False
The more security you have, the easier your computer is to use. a) True b) False
b) False
When you are identifying the materials you might need for putting together a presentation, stick to the "normal" materials to keep the presentation exciting. a) True b) False
b) False
You should use a lot of graphics in a presentation, especially logos, grids, and affiliations. a) True b) False
b) False
What does the Scenario Manager allow you to do? a) Helps arrange all of your data in various ways b) Helps you analyze has different variables affect your data c) Helps you problem solve using various constraints d) Create various scenarios with different input data
b) Helps you analyze has different variables affect your data d) Create various scenarios with different input data
Which of the following are true statements about Database Functions? a) DCOUNT is not a valid database function b) In general there is a corresponding standard with similar functionality in Excel c) They can be used on data in a standard Excel worksheet d) They require an external database for input data
b) In general there is a corresponding standard with similar functionality in Excel c) They can be used on data in a standard Excel worksheet
Which of the following are true about malware? a) Theses are programs that always cause damage to the infected computer b) Short for malicious software c) Programs designed to disrupt or deny operation, gather information, and gain unauthorized access. d) Software is considered malware based on the intent of the programmer
b) Short for malicious software c) Programs designed to disrupt or deny operation, gather information, and gain unauthorized access. d) Software is considered malware based on the intent of the programmer
What tool in Excel allows you to rearrange and organize data based on categories? a) Filtering b) Sorting c) Finding d) Data Hunt
b) Sorting
In computer security, authentication is which of the following? a) The act of ensuring the operation you are attempting to perform can be done safely b) The act of identifying yourself to the operation you are attempting to perform c) The act of identifying the operation you are attempting to perform d) The act of ensuring you have the permissions to perform the operation you are performing
b) The act of identifying yourself to the operation you are attempting to perform
Which of the following are reasons we need security on computers? a) To update the operating system regularly b) To protect money c) To protect information d) To ensure personal safety e) To allow us to perform backups
b) To protect money c) To protect information d) To ensure personal safety
Which of the following would be consided Personally Identifying Information (PII)? a) Surfing habits b) Bank Account Number c) Social Security Number d) Purchasing habits e) Name
b) bank account number c) social security number e) name
=SUMIF(D2:D9, ">10%", C2:C9) In the above SUMIF function which argument represents the range to be summed if the criteria is met? a) Argument 2 (">10%") b) Argument 1 (D2:D9) c) Argument 3 (C2:C9) d) The argument is not present
c) Argument 3 (C2:C9)
The short cut for the copy command is a) CRTL + CP b) CRTL + SC c) CRTL + C d) CRTL + P
c) CRTL + C
What can Data Validation in Excel do? a) It can create different scenarios of my data b) It can preform different formulas c) It can provide rules and ranges for data in a worksheet d) It can correct the data and formulas in a worksheet
c) It can provide rules and ranges for data in a worksheet
What can you use to visualize your data from a Pivot Table a) Pivot Displays b) Pivot Pictures c) Pivot Charts d) Pivot Table Fields
c) Pivot Charts
What kind of table allows you to view and manipulate your table without actually changing the data in the worksheet? a) Editing Tables b) Partial Tables c) Pivot Table d) Mini Table
c) Pivot Table
Why does Excel offer you so many tools? a) To provide a confusing atmosphere to learn in b) To make it more difficult to learn c) To provide you with as many tools to help you organize and interpret your data d) If offers so many tools so it can charge more
c) To provide you with as many tools to help you organize and interpret your data
What value will the following function return: =OR(False, True, 4<7) a) Error: the OR function can not interpret argument b) False c) True d) Error: the OR function only takes two arguments
c) True