Study online at https://quizlet.com/_5252bj
1. 211. Which of the following is the process of ensuring that data is protected
from unauthorized access?
A. integrity
B. cryptography
C. con�dentiality
D. availability
E. cipher: Answer Key: C
2. 209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference: C
3. 208. Which of the following is data appended to a message to ensure the
authenticity of the message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
D. substitution cipher
E. transposition cipher: Answer Key: C
4. hich of the following is used to retrieve data from a database?
A. record
B. key
C. �eld
D. query
E. table: Answer Key: D
5. 205. Which of the following is the �eld of study related to encoded informa-
tion?
A. integrity
B. cryptography
C. con�dentiality
, itm 207 �nal exam questions < 100
Study online at https://quizlet.com/_5252bj
D. availability
E. cipher: Answer Key: B
6. 203. Which of the following database elements is composed of a set of related
data items, such as a person's name, address, and id number?
A. record
B. key
C. �eld
D. query
E. table: Answer Key: A
7. 202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference: Answer Key: D
8. 199. Which of the following is used to specify a set of adjacent elements in a
spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference: Answer Key: B
9. 196. Which of the following represents a formula in a spreadsheet?
A. G14..H27
B. J24
C. A3..A7
D. =J24/J23
E. 15B: Answer Key: D
10. 195. Which of the following represents a single-column range in a spread-
sheet?
A. G14..H27
B. J24
, itm 207 �nal exam questions < 100
Study online at https://quizlet.com/_5252bj
C. A3..A7
D. =J24/J23
E. 15B: Answer Key: C
11. 193. Which of the following is a common database language?
A. SQL
B. key
C. �eld
D. query
E. schema: Answer Key: A
12. 192. Which of the following is composed of a related set of database
records?
A. SQL
B. key
C. �eld
D. query
E. table: Answer Key: E
13. 191. Which of the following is the process of ensuring that data can be
modi�ed only by appropriate mechanisms?
A. integrity
B. cryptography
C. con�dentiality
D. availability
E. cipher: Answer Key: A
14. 190. Which of the following describes a spreadsheet calculation that cannot
be resolved?
A. what-if
B. range
C. formula
D. cell
E. circular reference: Answer Key: E
15. 189. Which of the following is the degree to which authorized users can
access information for legitimate purposes?