JY CHEN - Ask Anything, Learn Everything. Logo

Questions in computers-and-technology

[Free] Which of the following is NOT a characteristic of successful technology professionals? A. The ability to stay focused on current technology. B. The ability to think outside-the-box to solve problems. C. The ability to communicate ideas with co-workers. D. The ability to work on a team.

[Free] What does the term "absolute referencing" mean in Excel? A. A reference that is based on the current cell B. A reference that remains constant C. A reference that is relative to other cells D. A reference that changes when a formula is copied

[Free] Match each of the following life cycles to their purpose: The process used to design, develop, and test software. The management of a system from procurement to retirement. Managing and reducing cybersecurity risk.

[Free] You find out that you will have technology available to you while you present your message, so you decide to include visuals in your presentation. What have you adapted your message for? A. Your environment B. Your topic C. Your culture D. Your context

[Free] Question 2: What does a "Type 1 error" refer to in the context of the confusion matrix? A. Predicting "Yes" when the actual value is "No." B. Predicting "No" when the actual value is "Yes." C. A false positive prediction. D. A false negative prediction.

[Free] How do you adjust the height of a row in Excel? A. Right-click the row number and select Row Height B. Use the Insert tab C. Drag the boundary below the row number D. Use the Format option in the Home tab

[Free] Which SQL function calculates the average of a numeric column? MIN() SUM() MAX() AVG()

[Free] With the implementation of an EHR, it is helpful if employees can be cross-trained so that they are able to perform more than one duty within the EHR.

[Free] Which field in a database acts as a unique identifier for records? A. Unique Key B. Foreign Key C. Index D. Primary Key

[Free] Bryan receives an e-mail from a group posing as police officers requesting personal information. This is an example of A. social engineering. B. phishing. C. counterfeiting. D. forgery.