ITM 207 Computer-Enabled Problem
Solving final exam study ahead
questions and answers
,211. Which of the following is the process of ensuring that data is protected from unauthorized access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - Answer Key: C
209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - C
208. Which of the following is data appended to a message to ensure the authenticity of the message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
D. substitution cipher
E. transposition cipher - Answer Key: C
hich of the following is used to retrieve data from a database?
A. record
B. key
C. field
, D. query
E. table - Answer Key: D
205. Which of the following is the field of study related to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - Answer Key: B
203. Which of the following database elements is composed of a set of related data items, such as a
person's name, address, and id number?
A. record
B. key
C. field
D. query
E. table - Answer Key: A
202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - Answer Key: D
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
Solving final exam study ahead
questions and answers
,211. Which of the following is the process of ensuring that data is protected from unauthorized access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - Answer Key: C
209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - C
208. Which of the following is data appended to a message to ensure the authenticity of the message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
D. substitution cipher
E. transposition cipher - Answer Key: C
hich of the following is used to retrieve data from a database?
A. record
B. key
C. field
, D. query
E. table - Answer Key: D
205. Which of the following is the field of study related to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - Answer Key: B
203. Which of the following database elements is composed of a set of related data items, such as a
person's name, address, and id number?
A. record
B. key
C. field
D. query
E. table - Answer Key: A
202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - Answer Key: D
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?