Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
Author: Anonymous
Cassidy is a medical assistant in a hospital and has access…
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital’s database. Based on Cassidy’s actions what systems do you think the hospital has in place to protect the patient medical records?
Tikenya was responsible for creating the PowerPoint presenta…
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?
Which of the following statements about browser security set…
Which of the following statements about browser security settings is false?
What concerns are there about open source programs?
What concerns are there about open source programs?
In terms of privacy, which of the following is a best practi…
In terms of privacy, which of the following is a best practice?
If you delete a shortcut from your desktop, have you also de…
If you delete a shortcut from your desktop, have you also deleted the original file?
When a CPU executes instructions as it converts input into o…
When a CPU executes instructions as it converts input into output, it does so with _____.
Which of the following forms of identity theft involves posi…
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
Simon has difficulty pressing and holding more than one key…
Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?