ITE 152 EXAM 3, PRACTICE EXAM AND STUDY GUIDE NEWEST 2024 ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+

1 | P a g e

ITE 152 EXAM 3, PRACTICE EXAM AND STUDY

GUIDE NEWEST 2024 ACTUAL EXAM 300 QUESTIONS

AND CORRECT DETAILED ANSWERS (VERIFIED

ANSWERS) |ALREADY GRADED A+

ITE 152 EXAM 3

Which of the following is a way to sort data?

-Numerically

-Alphabetically

-All of the above

-Chronologically - ANSWER- All of the above

Contact information for all the people taking a class at a school are

stored in a ________ called Students.

-record

-worksheet

-field

-table - ANSWER- Table

Kian needs to sort a list of patients by birthdate to show the oldest

patients first. What sort order on the birthdate field will give him this

result?

-Z to A


2 | P a g e

-A to Z

-Largest to smallest

-Smallest to largest - ANSWER- Smallest to largest

A query lets you speed up the browsing process by finding information

that matches specifically to your criteria.

-True

-False - ANSWER- True

Which data type would be best suited to a field that lists a product's

clearance price?

-Currency

-Number

-AutoNumber

-Date/Time - ANSWER- Currency

What are the different views to display a table?

-Design View

-All of the above

-Pivot Table & Pivot Chart View

-Datasheet View - ANSWER- All of the above

Which of the following is NOT a part of a database?

-Tables


3 | P a g e

-Records

-Worksheets

-Fields - ANSWER- Worksheets

Which is a first step to deter thieves from accessing your financial

information?

-Be alert to signs that may indicate unusual activity in an account.

-Do not provide personal information over the phone or through email.

-Follow up on calls regarding purchases that were not made.

-Review financial and billing statements each month carefully. -

ANSWER- Do not provide personal information over the phone or

through email.

Isabel received a message on her computer that appeared to be from the

FBI. It informed her that her computer has been locked and she would

need to pay a fee to retrieve her data. How would you describe what is

happening?

-A worm has infected her computer and she needs to unplug her device.

-A hacker is trying to put a Trojan on her computer.

-Nothing has happened and the message is fine to ignore since she has

not been home all day and her computer has not been turned on until

now.

-It is most likely ransomware because it is telling her she has to verify

payment information to unlock her computer. - ANSWER- It is most

likely ransomware because it is telling her she has to verify payment

information to unlock her computer.


4 | P a g e

To protect your information and help you to remember passwords, use

your social media account login information to log into another site.

-True

-False - ANSWER- False

After Penny broke up with her boyfriend, he texted some teammates

from the track team about some private and intimate moments he and

Penny had shared while they were dating. He even lied about their

breakup, creating rumors about her behavior. Penny started getting

inappropriate looks and advances from the team whenever she was at

practice and felt completely humiliated. Penny is a victim of ________.

-cyberbullying

-cyberstalking

-data mining

-social engineering - ANSWER- Cyberbullying

Which term refers to the science that specifies the design and

arrangement of items you use so you interact with the items efficiently

and safely?

-Ergonomics

-Technology addiction

-Repetitive strain

-Cyberbullying - ANSWER- Ergonomics


No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $31.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing