Solutions
Save
Terms in this set (73)
211. Which of the following Answer Key: C
is the process of ensuring
that data is protected from
unauthorized access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher
209. Which of the following C
is used to perform a
calculation in a
spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
208. Which of the following Answer Key: C
is data appended to a
message to ensure the
authenticity of the
message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
D. substitution cipher
E. transposition cipher
,hich of the following is Answer Key: D
used to retrieve data from a
database?
A. record
B. key
C. field
D. query
E. table
205. Which of the following Answer Key: B
is the field of study related
to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher
203. Which of the following Answer Key: A
database elements is
composed of a set of
related data items, such as
a person's name, address,
and id number?
A. record
B. key
C. field
D. query
E. table
202. Which of the following Answer Key: D
designates a single location
in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
, 199. Which of the following Answer Key: B
is used to specify a set of
adjacent elements in a
spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
199. Which of the following Answer Key: B
is used to specify a set of
adjacent elements in a
spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
196. Which of the following Answer Key: D
represents a formula in a
spreadsheet?
A. G14..H27
B. J24
C. A3..A7
D. =J24/J23
E. 15B
195. Which of the following Answer Key: C
represents a single-column
range in a spreadsheet?
A. G14..H27
B. J24
C. A3..A7
D. =J24/J23
E. 15B