ログイン

Finals elective
54問 • 1年前
  • Dasay Montes
  • 通報

    問題一覧

  • 1

    A graphical representation of data inserted using the Insert tab.

    Chart

  • 2

    A grid where you can enter, organize, and calculate data in rows and columns.

    worksheet

  • 3

    A horizontal slider located in the status bar to adjust the zoom level of the worksheet

    zoom slider

  • 4

    bar al the top of the Excel window that contains tabs like File, Home, and Insert.

    Ribbon

  • 5

    Displays the name or reference of the currently selected cell.

    name box

  • 6

    Identified by letters (A, B, C, etc.), this is a vertical division of the worksheet

    columns

  • 7

    Identified by numbers (1, 2, 3, etc.), this is a horizontal division of the worksheet.

    rows

  • 8

    Located in the top-left corner, this toolbar provides quick access to frequently used commands.

    Quick Access Toolbar

  • 9

    The area below the Ribbon where worksheet tabs are displayed.

    worksheet tabs

  • 10

    The button in the top right corner of the Excel window that closes the application.

    close button

  • 11

    The button that expands or collapses the Ribbon to provide more space on the screen.

    collapse ribbon button

  • 12

    The buttons at the bottom right corner of the screen that allow you to switch between

    view button

  • 13

    The element used to navigate to a specific area in the worksheet by dragging

    scroll bar

  • 14

    The green border that indicates the currently selected cell.

    active cell

  • 15

    The intersection of a row and column where data can be entered

    cell

  • 16

    The part of the interface where you can type or insert formulas and functions

    formula bar

  • 17

    The section of the Excel interface where additional contextual tools appear when working with objects like charts

    contextual tab

  • 18

    The section where you can view and edit the content or formula of a selected cell

    formula bar

  • 19

    The small buttons in the top-right corner for minimizing, maximizing, or closing the workbook.

    window control button

  • 20

    The tab that opens Backstage View for file-related commands like Save and Print

    file tab

  • 21

    A customizable toolbar at the top-left of the window that provides access to commonly used commands.

    Quick Access Toolbar

  • 22

    A slider on the bottom-right of the window used to zoom in or out on the document.

    zoom slider

  • 23

    Located at the bottom of the window, it displays information like the page number, word count, and zoom slider.

    status bar

  • 24

    The bar at the very top of the window that displays the name of the document and application.

    title bar

  • 25

    The button at the bottom-right of the window that allows you to change the document view to options like Print Layout or Web Layout

    view button

  • 26

    The feature that allows you to scroll through the document horizontally or vertically

    scroll bar

  • 27

    The feature used to measure and align text, graphics, or other elements in the document.

    ruler

  • 28

    The flashing vertical line in the document that indicates where text or objects will be inserted

    insertion point

  • 29

    The section of the interface that contains tabs like Home, Insert, and Page Layout, each containing a set of commands

    ribbon

  • 30

    10?

    file tab

  • 31

    defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and the child pornography) is used as tool to commit an offense

    cybercrime

  • 32

    may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

    cybercriminals

  • 33

    a law in the Philippines approved on Sept. 12, 2012 which aims to address legal issues concerning online interactions and internet.

    RA 10175

  • 34

    an act protecting individual personal information.

    RA 10173

  • 35

    Common Forms of Cybercrimes

    copyright, plagiarism, cyber bullying

  • 36

    computer hobbyist who enjoy pushing computer system to their limits

    hackers

  • 37

    obsessed with gaining entry to highly secure computer systems

    crackers

  • 38

    bring crackers together by means of the internet and physical meetings

    cyber gang

  • 39

    makers of computer viruses.

    computer virus author

  • 40

    kick out employees someone who is unhappy with their job, workplace, or employer.

    disgruntled employees

  • 41

    someone who deceives others to gain personal gain. swindlers & shills

    fraud artist

  • 42

    a person who uses their hacking ability to find security vulnerabilities in software, hardware, or networks.

    white hat hackers

  • 43

    hacker is a cybercriminal who accesses computer systems without authorization for malicious purposes.

    black hat hackers

  • 44

    enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

    grey hat hackers

  • 45

    likely refers to a group of hackers with diverse skills and interests. They might specialize in various hacking techniques, targeting different systems or using a range of tools.

    miscellaneous hacker

  • 46

    can perform a single attack to expose confidential information and make a statement

    red hat hacker

  • 47

    ethical hackers who are hired to identify and fix vulnerabilities in systems before they are released to the public

    blue hat hackers

  • 48

    the most skilled and experienced hackers

    elite hat hackers

  • 49

    typically refers to individuals who utilize pre-written scripts or automated tools to exploit vulnerabilities in systems.

    script hackers

  • 50

    New hacker

    neophyte

  • 51

    Anti-bullying act of 2013 (RA 10627)

    cyber bullying

  • 52

    sexual exploitation RA 9775 anti-child pornography act of 2009 penalty 12-20 years imprisonment or reclusion temporal

    child pornography

  • 53

    harm reputation of a person penalty 6 to 12 years imprisonment of prison mayor

    cyber defamation

  • 54

    • An attempt to obtain sensitive information through deceptive means

    pishing

  • examen Alexandru

    examen Alexandru

    ユーザ名非公開 · 40問 · 8日前

    examen Alexandru

    examen Alexandru

    40問 • 8日前
    ユーザ名非公開

    jjj

    jjj

    ユーザ名非公開 · 45問 · 3ヶ月前

    jjj

    jjj

    45問 • 3ヶ月前
    ユーザ名非公開

    Lecture 2

    Lecture 2

    Oluwole Akande · 5問 · 3ヶ月前

    Lecture 2

    Lecture 2

    5問 • 3ヶ月前
    Oluwole Akande

    Q2 Quiz 1

    Q2 Quiz 1

    Abimae Riela Gavino · 19問 · 4ヶ月前

    Q2 Quiz 1

    Q2 Quiz 1

    19問 • 4ヶ月前
    Abimae Riela Gavino

    History and Discovery of Microorganisms

    History and Discovery of Microorganisms

    HERSHEY VALERIE BERNARDINO · 80問 · 4ヶ月前

    History and Discovery of Microorganisms

    History and Discovery of Microorganisms

    80問 • 4ヶ月前
    HERSHEY VALERIE BERNARDINO

    L.O. | The Threat Intelligence Cycle

    L.O. | The Threat Intelligence Cycle

    The R.S.S.H Delivery Company · 40問 · 4ヶ月前

    L.O. | The Threat Intelligence Cycle

    L.O. | The Threat Intelligence Cycle

    40問 • 4ヶ月前
    The R.S.S.H Delivery Company

    4.1

    4.1

    Sab Sescon · 34問 · 4ヶ月前

    4.1

    4.1

    34問 • 4ヶ月前
    Sab Sescon

    Astronomic Geodesy

    Astronomic Geodesy

    ユーザ名非公開 · 13問 · 5ヶ月前

    Astronomic Geodesy

    Astronomic Geodesy

    13問 • 5ヶ月前
    ユーザ名非公開

    PR

    PR

    ユーザ名非公開 · 27問 · 5ヶ月前

    PR

    PR

    27問 • 5ヶ月前
    ユーザ名非公開

    RECALLS 3 - NP4

    RECALLS 3 - NP4

    CILENEY · 100問 · 5ヶ月前

    RECALLS 3 - NP4

    RECALLS 3 - NP4

    100問 • 5ヶ月前
    CILENEY

    15 ) EX. 14 | COMPLETE

    15 ) EX. 14 | COMPLETE

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    15 ) EX. 14 | COMPLETE

    15 ) EX. 14 | COMPLETE

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    NCBTS SOC STUD 101-200

    NCBTS SOC STUD 101-200

    Angel Borres · 100問 · 6ヶ月前

    NCBTS SOC STUD 101-200

    NCBTS SOC STUD 101-200

    100問 • 6ヶ月前
    Angel Borres

    P1

    P1

    E · 35問 · 10ヶ月前

    P1

    P1

    35問 • 10ヶ月前
    E

    Weed science

    Weed science

    Rin Rin · 31問 · 1年前

    Weed science

    Weed science

    31問 • 1年前
    Rin Rin

    HPC 102 FINALS

    HPC 102 FINALS

    Leah Jean Better · 27問 · 1年前

    HPC 102 FINALS

    HPC 102 FINALS

    27問 • 1年前
    Leah Jean Better

    NUCLEAR (Module 6)

    NUCLEAR (Module 6)

    Alexander Naje · 35問 · 1年前

    NUCLEAR (Module 6)

    NUCLEAR (Module 6)

    35問 • 1年前
    Alexander Naje

    Q1

    Q1

    Sabrina Mikhaela Canindo · 54問 · 1年前

    Q1

    Q1

    54問 • 1年前
    Sabrina Mikhaela Canindo

    research strategies

    research strategies

    kiler · 22問 · 1年前

    research strategies

    research strategies

    22問 • 1年前
    kiler

    chapter 18

    chapter 18

    ユーザ名非公開 · 44問 · 1年前

    chapter 18

    chapter 18

    44問 • 1年前
    ユーザ名非公開

    awards and honours 2

    awards and honours 2

    Pratyasha Acharya · 37問 · 1年前

    awards and honours 2

    awards and honours 2

    37問 • 1年前
    Pratyasha Acharya

    問題一覧

  • 1

    A graphical representation of data inserted using the Insert tab.

    Chart

  • 2

    A grid where you can enter, organize, and calculate data in rows and columns.

    worksheet

  • 3

    A horizontal slider located in the status bar to adjust the zoom level of the worksheet

    zoom slider

  • 4

    bar al the top of the Excel window that contains tabs like File, Home, and Insert.

    Ribbon

  • 5

    Displays the name or reference of the currently selected cell.

    name box

  • 6

    Identified by letters (A, B, C, etc.), this is a vertical division of the worksheet

    columns

  • 7

    Identified by numbers (1, 2, 3, etc.), this is a horizontal division of the worksheet.

    rows

  • 8

    Located in the top-left corner, this toolbar provides quick access to frequently used commands.

    Quick Access Toolbar

  • 9

    The area below the Ribbon where worksheet tabs are displayed.

    worksheet tabs

  • 10

    The button in the top right corner of the Excel window that closes the application.

    close button

  • 11

    The button that expands or collapses the Ribbon to provide more space on the screen.

    collapse ribbon button

  • 12

    The buttons at the bottom right corner of the screen that allow you to switch between

    view button

  • 13

    The element used to navigate to a specific area in the worksheet by dragging

    scroll bar

  • 14

    The green border that indicates the currently selected cell.

    active cell

  • 15

    The intersection of a row and column where data can be entered

    cell

  • 16

    The part of the interface where you can type or insert formulas and functions

    formula bar

  • 17

    The section of the Excel interface where additional contextual tools appear when working with objects like charts

    contextual tab

  • 18

    The section where you can view and edit the content or formula of a selected cell

    formula bar

  • 19

    The small buttons in the top-right corner for minimizing, maximizing, or closing the workbook.

    window control button

  • 20

    The tab that opens Backstage View for file-related commands like Save and Print

    file tab

  • 21

    A customizable toolbar at the top-left of the window that provides access to commonly used commands.

    Quick Access Toolbar

  • 22

    A slider on the bottom-right of the window used to zoom in or out on the document.

    zoom slider

  • 23

    Located at the bottom of the window, it displays information like the page number, word count, and zoom slider.

    status bar

  • 24

    The bar at the very top of the window that displays the name of the document and application.

    title bar

  • 25

    The button at the bottom-right of the window that allows you to change the document view to options like Print Layout or Web Layout

    view button

  • 26

    The feature that allows you to scroll through the document horizontally or vertically

    scroll bar

  • 27

    The feature used to measure and align text, graphics, or other elements in the document.

    ruler

  • 28

    The flashing vertical line in the document that indicates where text or objects will be inserted

    insertion point

  • 29

    The section of the interface that contains tabs like Home, Insert, and Page Layout, each containing a set of commands

    ribbon

  • 30

    10?

    file tab

  • 31

    defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and the child pornography) is used as tool to commit an offense

    cybercrime

  • 32

    may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

    cybercriminals

  • 33

    a law in the Philippines approved on Sept. 12, 2012 which aims to address legal issues concerning online interactions and internet.

    RA 10175

  • 34

    an act protecting individual personal information.

    RA 10173

  • 35

    Common Forms of Cybercrimes

    copyright, plagiarism, cyber bullying

  • 36

    computer hobbyist who enjoy pushing computer system to their limits

    hackers

  • 37

    obsessed with gaining entry to highly secure computer systems

    crackers

  • 38

    bring crackers together by means of the internet and physical meetings

    cyber gang

  • 39

    makers of computer viruses.

    computer virus author

  • 40

    kick out employees someone who is unhappy with their job, workplace, or employer.

    disgruntled employees

  • 41

    someone who deceives others to gain personal gain. swindlers & shills

    fraud artist

  • 42

    a person who uses their hacking ability to find security vulnerabilities in software, hardware, or networks.

    white hat hackers

  • 43

    hacker is a cybercriminal who accesses computer systems without authorization for malicious purposes.

    black hat hackers

  • 44

    enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

    grey hat hackers

  • 45

    likely refers to a group of hackers with diverse skills and interests. They might specialize in various hacking techniques, targeting different systems or using a range of tools.

    miscellaneous hacker

  • 46

    can perform a single attack to expose confidential information and make a statement

    red hat hacker

  • 47

    ethical hackers who are hired to identify and fix vulnerabilities in systems before they are released to the public

    blue hat hackers

  • 48

    the most skilled and experienced hackers

    elite hat hackers

  • 49

    typically refers to individuals who utilize pre-written scripts or automated tools to exploit vulnerabilities in systems.

    script hackers

  • 50

    New hacker

    neophyte

  • 51

    Anti-bullying act of 2013 (RA 10627)

    cyber bullying

  • 52

    sexual exploitation RA 9775 anti-child pornography act of 2009 penalty 12-20 years imprisonment or reclusion temporal

    child pornography

  • 53

    harm reputation of a person penalty 6 to 12 years imprisonment of prison mayor

    cyber defamation

  • 54

    • An attempt to obtain sensitive information through deceptive means

    pishing