ITM 207 final exam questions and Answers |
2025/26 Update | 100% Correct
211. Which of the following is the process of ensuring that data is protected from
unauthorized access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher
Answer Key: C
209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
C
208. Which of the following is data appended to a message to ensure the authenticity of the
message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
,D. substitution cipher
E. transposition cipher
Answer Key: C
hich of the following is used to retrieve data from a database?
A. record
B. key
C. field
D. query
E. table
Answer Key: D
205. Which of the following is the field of study related to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher
Answer Key: B
203. Which of the following database elements is composed of a set of related data items,
such as a person's name, address, and id number?
A. record
B. key
C. field
, D. query
E. table
Answer Key: A
202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
Answer Key: D
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
Answer Key: B
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
2025/26 Update | 100% Correct
211. Which of the following is the process of ensuring that data is protected from
unauthorized access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher
Answer Key: C
209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
C
208. Which of the following is data appended to a message to ensure the authenticity of the
message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
,D. substitution cipher
E. transposition cipher
Answer Key: C
hich of the following is used to retrieve data from a database?
A. record
B. key
C. field
D. query
E. table
Answer Key: D
205. Which of the following is the field of study related to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher
Answer Key: B
203. Which of the following database elements is composed of a set of related data items,
such as a person's name, address, and id number?
A. record
B. key
C. field
, D. query
E. table
Answer Key: A
202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
Answer Key: D
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference
Answer Key: B
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula