- | P a g e
ITE 152 EXAM 3, PRACTICE EXAM AND STUDY
GUIDE NEWEST 00 QUESTIONS
AND CORRECT DETAILED ANSWERS (VERIFIED
ANSWERS) |ALREADY GRADED A+
ITE 152 EXAM 3
Which of the following is a way to sort data?-Numerically -Alphabetically -All of the above -Chronologically - ANSWER- All of the above
Contact information for all the people taking a class at a school are stored in a ________ called Students.-record -worksheet -field -table - ANSWER- Table
Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result?-Z to A 1 / 4
- | P a g e
-A to Z -Largest to smallest -Smallest to largest - ANSWER- Smallest to largest
A query lets you speed up the browsing process by finding information that matches specifically to your criteria.-True -False - ANSWER- True
Which data type would be best suited to a field that lists a product's clearance price?-Currency -Number -AutoNumber -Date/Time - ANSWER- Currency
What are the different views to display a table?-Design View -All of the above -Pivot Table & Pivot Chart View -Datasheet View - ANSWER- All of the above
Which of the following is NOT a part of a database?-Tables 2 / 4
- | P a g e
-Records -Worksheets -Fields - ANSWER- Worksheets
Which is a first step to deter thieves from accessing your financial information?-Be alert to signs that may indicate unusual activity in an account.-Do not provide personal information over the phone or through email.-Follow up on calls regarding purchases that were not made.-Review financial and billing statements each month carefully. - ANSWER- Do not provide personal information over the phone or through email.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?-A worm has infected her computer and she needs to unplug her device.-A hacker is trying to put a Trojan on her computer.-Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.-It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. - ANSWER- It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. 3 / 4
- | P a g e
To protect your information and help you to remember passwords, use your social media account login information to log into another site.-True -False - ANSWER- False
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.-cyberbullying -cyberstalking -data mining -social engineering - ANSWER- Cyberbullying
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?-Ergonomics -Technology addiction -Repetitive strain -Cyberbullying - ANSWER- Ergonomics
- / 4