暗記メーカー
ログイン
Finals elective
  • Dasay Montes

  • 問題数 54 • 12/8/2024

    記憶度

    完璧

    8

    覚えた

    21

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    A graphical representation of data inserted using the Insert tab.

    Chart

  • 2

    A grid where you can enter, organize, and calculate data in rows and columns.

    worksheet

  • 3

    A horizontal slider located in the status bar to adjust the zoom level of the worksheet

    zoom slider

  • 4

    bar al the top of the Excel window that contains tabs like File, Home, and Insert.

    Ribbon

  • 5

    Displays the name or reference of the currently selected cell.

    name box

  • 6

    Identified by letters (A, B, C, etc.), this is a vertical division of the worksheet

    columns

  • 7

    Identified by numbers (1, 2, 3, etc.), this is a horizontal division of the worksheet.

    rows

  • 8

    Located in the top-left corner, this toolbar provides quick access to frequently used commands.

    Quick Access Toolbar

  • 9

    The area below the Ribbon where worksheet tabs are displayed.

    worksheet tabs

  • 10

    The button in the top right corner of the Excel window that closes the application.

    close button

  • 11

    The button that expands or collapses the Ribbon to provide more space on the screen.

    collapse ribbon button

  • 12

    The buttons at the bottom right corner of the screen that allow you to switch between

    view button

  • 13

    The element used to navigate to a specific area in the worksheet by dragging

    scroll bar

  • 14

    The green border that indicates the currently selected cell.

    active cell

  • 15

    The intersection of a row and column where data can be entered

    cell

  • 16

    The part of the interface where you can type or insert formulas and functions

    formula bar

  • 17

    The section of the Excel interface where additional contextual tools appear when working with objects like charts

    contextual tab

  • 18

    The section where you can view and edit the content or formula of a selected cell

    formula bar

  • 19

    The small buttons in the top-right corner for minimizing, maximizing, or closing the workbook.

    window control button

  • 20

    The tab that opens Backstage View for file-related commands like Save and Print

    file tab

  • 21

    A customizable toolbar at the top-left of the window that provides access to commonly used commands.

    Quick Access Toolbar

  • 22

    A slider on the bottom-right of the window used to zoom in or out on the document.

    zoom slider

  • 23

    Located at the bottom of the window, it displays information like the page number, word count, and zoom slider.

    status bar

  • 24

    The bar at the very top of the window that displays the name of the document and application.

    title bar

  • 25

    The button at the bottom-right of the window that allows you to change the document view to options like Print Layout or Web Layout

    view button

  • 26

    The feature that allows you to scroll through the document horizontally or vertically

    scroll bar

  • 27

    The feature used to measure and align text, graphics, or other elements in the document.

    ruler

  • 28

    The flashing vertical line in the document that indicates where text or objects will be inserted

    insertion point

  • 29

    The section of the interface that contains tabs like Home, Insert, and Page Layout, each containing a set of commands

    ribbon

  • 30

    10?

    file tab

  • 31

    defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and the child pornography) is used as tool to commit an offense

    cybercrime

  • 32

    may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

    cybercriminals

  • 33

    a law in the Philippines approved on Sept. 12, 2012 which aims to address legal issues concerning online interactions and internet.

    RA 10175

  • 34

    an act protecting individual personal information.

    RA 10173

  • 35

    Common Forms of Cybercrimes

    copyright, plagiarism, cyber bullying

  • 36

    computer hobbyist who enjoy pushing computer system to their limits

    hackers

  • 37

    obsessed with gaining entry to highly secure computer systems

    crackers

  • 38

    bring crackers together by means of the internet and physical meetings

    cyber gang

  • 39

    makers of computer viruses.

    computer virus author

  • 40

    kick out employees someone who is unhappy with their job, workplace, or employer.

    disgruntled employees

  • 41

    someone who deceives others to gain personal gain. swindlers & shills

    fraud artist

  • 42

    a person who uses their hacking ability to find security vulnerabilities in software, hardware, or networks.

    white hat hackers

  • 43

    hacker is a cybercriminal who accesses computer systems without authorization for malicious purposes.

    black hat hackers

  • 44

    enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

    grey hat hackers

  • 45

    likely refers to a group of hackers with diverse skills and interests. They might specialize in various hacking techniques, targeting different systems or using a range of tools.

    miscellaneous hacker

  • 46

    can perform a single attack to expose confidential information and make a statement

    red hat hacker

  • 47

    ethical hackers who are hired to identify and fix vulnerabilities in systems before they are released to the public

    blue hat hackers

  • 48

    the most skilled and experienced hackers

    elite hat hackers

  • 49

    typically refers to individuals who utilize pre-written scripts or automated tools to exploit vulnerabilities in systems.

    script hackers

  • 50

    New hacker

    neophyte

  • 51

    Anti-bullying act of 2013 (RA 10627)

    cyber bullying

  • 52

    sexual exploitation RA 9775 anti-child pornography act of 2009 penalty 12-20 years imprisonment or reclusion temporal

    child pornography

  • 53

    harm reputation of a person penalty 6 to 12 years imprisonment of prison mayor

    cyber defamation

  • 54

    • An attempt to obtain sensitive information through deceptive means

    pishing