ITE 152 EXAM 3, PRACTICE EXAM AND STUDY GUIDE NEWEST 2024 ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
1 | P a g e
ITE 152 EXAM 3, PRACTICE EXAM AND STUDY
GUIDE NEWEST 2024 ACTUAL EXAM 300 QUESTIONS
AND CORRECT DETAILED ANSWERS (VERIFIED
ANSWERS) |ALREADY GRADED A+
ITE 152 EXAM 3
Which of the following is a way to sort data?
-Numerically
-Alphabetically
-All of the above
-Chronologically - ANSWER- All of the above
Contact information for all the people taking a class at a school are
stored in a ________ called Students.
-record
-worksheet
-field
-table - ANSWER- Table
Kian needs to sort a list of patients by birthdate to show the oldest
patients first. What sort order on the birthdate field will give him this
result?
-Z to A
2 | P a g e
-A to Z
-Largest to smallest
-Smallest to largest - ANSWER- Smallest to largest
A query lets you speed up the browsing process by finding information
that matches specifically to your criteria.
-True
-False - ANSWER- True
Which data type would be best suited to a field that lists a product's
clearance price?
-Currency
-Number
-AutoNumber
-Date/Time - ANSWER- Currency
What are the different views to display a table?
-Design View
-All of the above
-Pivot Table & Pivot Chart View
-Datasheet View - ANSWER- All of the above
Which of the following is NOT a part of a database?
-Tables
3 | P a g e
-Records
-Worksheets
-Fields - ANSWER- Worksheets
Which is a first step to deter thieves from accessing your financial
information?
-Be alert to signs that may indicate unusual activity in an account.
-Do not provide personal information over the phone or through email.
-Follow up on calls regarding purchases that were not made.
-Review financial and billing statements each month carefully. -
ANSWER- Do not provide personal information over the phone or
through email.
Isabel received a message on her computer that appeared to be from the
FBI. It informed her that her computer has been locked and she would
need to pay a fee to retrieve her data. How would you describe what is
happening?
-A worm has infected her computer and she needs to unplug her device.
-A hacker is trying to put a Trojan on her computer.
-Nothing has happened and the message is fine to ignore since she has
not been home all day and her computer has not been turned on until
now.
-It is most likely ransomware because it is telling her she has to verify
payment information to unlock her computer. - ANSWER- It is most
likely ransomware because it is telling her she has to verify payment
information to unlock her computer.
4 | P a g e
To protect your information and help you to remember passwords, use
your social media account login information to log into another site.
-True
-False - ANSWER- False
After Penny broke up with her boyfriend, he texted some teammates
from the track team about some private and intimate moments he and
Penny had shared while they were dating. He even lied about their
breakup, creating rumors about her behavior. Penny started getting
inappropriate looks and advances from the team whenever she was at
practice and felt completely humiliated. Penny is a victim of ________.
-cyberbullying
-cyberstalking
-data mining
-social engineering - ANSWER- Cyberbullying
Which term refers to the science that specifies the design and
arrangement of items you use so you interact with the items efficiently
and safely?
-Ergonomics
-Technology addiction
-Repetitive strain
-Cyberbullying - ANSWER- Ergonomics
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |