SlideShare a Scribd company logo
Which of the following is not one of the rules cited in class for making e-mail
more effective?
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Which of the following is not one of the rules cited in class for making e-mail more
effective?
A. Include Context B. Ask about one topic at a time
C. Use all capital letters D. Answer a backlog of email in reverse order
2. Which of the following is not an area to protect our computer in?
A. Installing protective systems. B. Tuning the installed protection
C. Wrapping the computer in foil D. Behaving to avoid difficulties
3. Which of the following is an example of identity theft?
A. taking a test for someone else B. using your older sibling's ID
C. posing as someone you're not to vote D. all of the above
4. The result of XORing 1011 1011 with 1001 0110 is
A. 0101 1100 B. 0101 0010 C. 1011 1111 D. 0100 0000
5. Respectively, rows and columns are designated with
A. numbers, letters B. letters, numbers C. numbers, numbers D. names, numbers
6. Spreadsheet formulas start with
A. + B. = C. @ D. !
7. Which of the following is not a valid range of cells?
A. A1>A5 B. C3-C8 C. 3B:6B D. all of the above
Page 27 of 30
8. All of the following are basic spreadsheet principles except
A. logical form B. clean layout C. no text D. clear and understandable
entries
9. To get the first characters in a cell you should use the
A. Begin function B. Start function C. Left function D. Get function
10. If you found regHours in a spreadsheet formula you'd know it's a
A. mistake B. named reference C. constant D. function
11. Which of the following is a valid XML tag?
A. <active?> B. <grad-date> C. <zip code> D. <DOB>
12. Which of the following is not one of the standard operations on databases?
A. Project B. Select C. Disassemble D. Union
13. The symbol to terminate a statement in JavaScript is
A. ~ B. ! C. . D. ;
14. Which of the following is not a term used to describe changing the value of a
variable?
A. assign B. gets C. sets D. becomes
15. All of the following are input elements except
A. print B. radio button C. text box D. checkbox
16. In JavaScript, onclick is a(n)
A. variable B. event C. event handler D. button
17. The building blocks of programming are
A. programming languages B. functions C. HTML and JavaScript D. variables
and events
18. Random numbers in JavaScript are generated using
A. Math.random() B. Rnd C. Math.rnd D. Random.Math()
19. Which keyword generally begins the last line of a function?
A. end B. final C. outtie D. return
20. A false outcome for a termination test means
A. terminate the loop B. terminate the program
C. continue the loop D. do not enter the loop
21. The maximum number of times a loop can iterate is
A. 1024 B. 65,536 C. 1,048,576 D. infinite
22. Array elements cannot be numbered with
A. negative numbers B. decimals C. letters D. all of the above
23. Computers can
A. think B. manipulate information C. be creative D. all of the above
24. All computer computations can be completed with just
A. 4 instructions B. 6 instructions C. 9 instructions D. 11
instructions
25. For quality control purposes, enter B here. Also, take a deep breath and relax.
A. Not this one B. This one C. Not this one either D. Definitely not this one
Matching (50 pts)
A. spam B. spyware C. phishing D. rootkit E. worm
26. Software that directly manipulates the OS to hide its presence.
27. Social engineering concept that involves convincing trusting people to give up
personal data.
28. Software that snoops on private information.
29. Software that copies itself over the Internet and contains malicious code.
30. Unsolicited commercial email.
A. cookie B. data controller C. key D. key escrow E. trapdoor
31. Registering a key with a third party so it can be retrieved easily.
32. In the RSA scheme, requires a 129 digit sequence made of the product of two
prime
numbers.
33. The person setting policies for private information
34. Sending data to a third party before it is encrypted to bypass the usage of the key.
35. A record containing seven fields of information that uniquely identify a customer's
session.
A. absolute cell reference B. relative cell reference C. function
D. foreign data E. delimited
36. Character symbolizing the end of each field (generally tab or semicolon)
37. A3
38. Data from another application to be imported into the spreadsheet
39. $A$3
40. MAX(A3:F3)
A. conditional formatting B. conditional formulas C. symbolic reference
D. literal reference E. filtering
41. Select only certain rows from a list.
42. Explicit column/row position
43. Make the entire computation of a cell contingent on the outcome of a condition
44. A word or phrase assigned to a cell or a range of cells
45. Applying an interpretation to the data and express that interpretation in an easy to
see
manner.
A. root element B. entity C. data type D. atomic E. relationship
46. The tag that encloses all of the content of the XML file.
47. Number, text, image, etc.
48. Anything that can be identified by a fixed number of its characteristics.
49. A correspondence between rows of one table and the rows of another table.
50. Not decomposable into any smaller parts.
A. programming B. assignment C. undefined D. Booleans E. compound
statement
51. When a name is declared but no value is assigned yet.
52. True or false.
53. Changing the value of a variable.
54. Groups of statements surrounded by {}.
55. The act of formulating an algorithm into code.
A. event handler B. onclick C. onchange D. dot operator E. event
56. The program that performs the task to respond to an event.
57. The event handling attribute for a button.
58. The event handling attribute for a text field
59. Provides a means of navigation to the proper object, selecting the property of an
object.
60. An indication from the computer that something just happened.
A. parameters B. call C. local variables D. global variables E. scope
61. Property that allows a local and global variable to share the same name.
62. Declared outside of any function, they can be used throughout the whole program.
63. Declared in a function and can only be used therein.
64. Run or execute the statements of the function to produce an answer.
65. Values the function will compute on, the input of the function.
A. iteration B. initialization C. nested loop D. array E.handle
66. A loop within a loop.
67. Set the iterations variable's value for the first iteration of the loop.
68. Looping through a series of statements to repeat them.
69. A special code the computer uses to identify an object like a timer.
70. An indexed base name.
A. evaluation function B. parallel computation C. metarules
D. Universality Principle E. intractable
71. Rules that describe how to break or transcend existing rules.
72. Any computer can simulate any other computer using only simple instructions
73. The application of several computers to a task.
74. A problem that cannot be solved with a realistic amount of computer time on any
computer.
75. A procedure that assigns a value to each piece and computes a score for each
move.
True/False (25 points)
76. One good method for creating a password is to take an acronym of something you
like and
substitute harder-to-guess pieces into it.
A. True B. False
77. Passwords are generally stored in plain text to allow the administrator easy access.
A. True B. False
78. A third-party cookie can use a loophole to get your information across different
sites.
A. True B. False
79. Backups are not a good idea for sensitive or important data.
A. True B. False
80. Text that is too long for a cell to display is truncated.
A. True B. False
81. To change a relative cell reference to an absolute reference, you should use the
ampersand
(&).
A. True B. False
82. In the example we did in class, the trip being planned was to the Arctic Circle.
A. True B. False
83. Spreadsheets can be sorted based on the current row, not by the current column.
A. True B. False
84. Individual pages in a spreadsheet are called leafs.
A. True B. False
85. Database users usually access logical views, not the physical database on the disk.
A. True B. False
86. - can be a binary or unary operator.
A. True B. False
87. JavaScript is mainly used for Web applications.
A. True B. False
88. When evaluating a statement with an = in it, start on the left side and compute that
first.
A. True B. False
89. Joining two strings together using the + is called concatenation.
A. True B. False
90. Radio button elements are used for both input and output.
A. True B. False
91. It is illegal to put a button element inside an XHTML table cell.
A. True B. False
92. Every function must have at least one parameter.
A. True B. False
93. A random number generated in JavaScript is always between 0 and 1.
A. True B. False
94. When a local and global variable have the same name, the global variable has
priority in the
function the local variable is declared in.
A. True B. False
95. j++ is a shortcut that means add j + j.
A. True B. False
96. An indexed item is called an element.
A. True B. False
97. You can safely use an element that is past the bounds of the array.
A. True B. False
98. NP-complete problems have no known "practical" algorithmic solutions.
A. True B. False
99. Work-proportional-to-n algorithms take longer than work-proportional-to-n2
algorithms.
A. True B. False
100. Select A. here because it is True that you are done with this class!
A. True B. False

More Related Content

DOC
one of the rules cited in class for making e-mail more effective Experience T...
PPTX
Project advance itt
PDF
C++11 and 64-bit Issues
PDF
Final project report
DOC
Comp 328 final guide (devry)
PDF
OXUS20 JAVA Programming Questions and Answers PART I
DOC
BISH CS Modle Exit Exam.doc
PDF
Question đúng cnu
one of the rules cited in class for making e-mail more effective Experience T...
Project advance itt
C++11 and 64-bit Issues
Final project report
Comp 328 final guide (devry)
OXUS20 JAVA Programming Questions and Answers PART I
BISH CS Modle Exit Exam.doc
Question đúng cnu

Similar to Which of the following is not one of the rules cited in class for making e mail more effective (20)

DOCX
S3 Data Processing Pre-Waec Examination (First Half)
DOCX
Which is not a step in the problem
DOCX
Which is not a step in the problem
DOC
Mcq+questions+cxc+it
DOCX
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
DOCX
Name _______________________________ Class time __________.docx
PDF
Java MCQ Questions and Answers PDF By ScholarHat
DOC
5: Every Java application is required to have
DOC
15: Which method call converts the value in variable stringVariable to an int...
DOC
Comp 328 final guide (devry)
DOC
7: Assume the following class declaration.
DOC
18: Which of the following does not generate an event?
DOC
202: When the user clicks a JCheckBox, a(n) occurs.
DOC
17: provides the basic attributes and behaviors of a window—a title bar at th...
DOC
8: Which statement below could be used to randomly select a state from an arr...
DOC
11: Which is a correct way to invoke the static method sqrt of the Math class?
DOC
1: The .class extension on a file means that the file
DOC
13: What do the following statements do?
DOC
12: When an object is concatenated with a String
DOC
22: The logical relationship between radio buttons is maintained by objects o...
S3 Data Processing Pre-Waec Examination (First Half)
Which is not a step in the problem
Which is not a step in the problem
Mcq+questions+cxc+it
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
Name _______________________________ Class time __________.docx
Java MCQ Questions and Answers PDF By ScholarHat
5: Every Java application is required to have
15: Which method call converts the value in variable stringVariable to an int...
Comp 328 final guide (devry)
7: Assume the following class declaration.
18: Which of the following does not generate an event?
202: When the user clicks a JCheckBox, a(n) occurs.
17: provides the basic attributes and behaviors of a window—a title bar at th...
8: Which statement below could be used to randomly select a state from an arr...
11: Which is a correct way to invoke the static method sqrt of the Math class?
1: The .class extension on a file means that the file
13: What do the following statements do?
12: When an object is concatenated with a String
22: The logical relationship between radio buttons is maintained by objects o...
Ad

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Pharma ospi slides which help in ospi learning
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Computing-Curriculum for Schools in Ghana
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Types and Its function , kingdom of life
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Lesson notes of climatology university.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
Basic Mud Logging Guide for educational purpose
Renaissance Architecture: A Journey from Faith to Humanism
Pharma ospi slides which help in ospi learning
Module 4: Burden of Disease Tutorial Slides S2 2025
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
Microbial disease of the cardiovascular and lymphatic systems
Computing-Curriculum for Schools in Ghana
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Types and Its function , kingdom of life
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Lesson notes of climatology university.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Ad

Which of the following is not one of the rules cited in class for making e mail more effective

  • 1. Which of the following is not one of the rules cited in class for making e-mail more effective? FOR MORE CLASSES VISIT www.tutorialoutlet.com Which of the following is not one of the rules cited in class for making e-mail more effective? A. Include Context B. Ask about one topic at a time C. Use all capital letters D. Answer a backlog of email in reverse order 2. Which of the following is not an area to protect our computer in? A. Installing protective systems. B. Tuning the installed protection C. Wrapping the computer in foil D. Behaving to avoid difficulties 3. Which of the following is an example of identity theft? A. taking a test for someone else B. using your older sibling's ID C. posing as someone you're not to vote D. all of the above 4. The result of XORing 1011 1011 with 1001 0110 is
  • 2. A. 0101 1100 B. 0101 0010 C. 1011 1111 D. 0100 0000 5. Respectively, rows and columns are designated with A. numbers, letters B. letters, numbers C. numbers, numbers D. names, numbers 6. Spreadsheet formulas start with A. + B. = C. @ D. ! 7. Which of the following is not a valid range of cells? A. A1>A5 B. C3-C8 C. 3B:6B D. all of the above Page 27 of 30 8. All of the following are basic spreadsheet principles except A. logical form B. clean layout C. no text D. clear and understandable entries 9. To get the first characters in a cell you should use the A. Begin function B. Start function C. Left function D. Get function
  • 3. 10. If you found regHours in a spreadsheet formula you'd know it's a A. mistake B. named reference C. constant D. function 11. Which of the following is a valid XML tag? A. <active?> B. <grad-date> C. <zip code> D. <DOB> 12. Which of the following is not one of the standard operations on databases? A. Project B. Select C. Disassemble D. Union 13. The symbol to terminate a statement in JavaScript is A. ~ B. ! C. . D. ; 14. Which of the following is not a term used to describe changing the value of a variable? A. assign B. gets C. sets D. becomes 15. All of the following are input elements except A. print B. radio button C. text box D. checkbox 16. In JavaScript, onclick is a(n)
  • 4. A. variable B. event C. event handler D. button 17. The building blocks of programming are A. programming languages B. functions C. HTML and JavaScript D. variables and events 18. Random numbers in JavaScript are generated using A. Math.random() B. Rnd C. Math.rnd D. Random.Math() 19. Which keyword generally begins the last line of a function? A. end B. final C. outtie D. return 20. A false outcome for a termination test means A. terminate the loop B. terminate the program C. continue the loop D. do not enter the loop 21. The maximum number of times a loop can iterate is A. 1024 B. 65,536 C. 1,048,576 D. infinite 22. Array elements cannot be numbered with
  • 5. A. negative numbers B. decimals C. letters D. all of the above 23. Computers can A. think B. manipulate information C. be creative D. all of the above 24. All computer computations can be completed with just A. 4 instructions B. 6 instructions C. 9 instructions D. 11 instructions 25. For quality control purposes, enter B here. Also, take a deep breath and relax. A. Not this one B. This one C. Not this one either D. Definitely not this one Matching (50 pts) A. spam B. spyware C. phishing D. rootkit E. worm 26. Software that directly manipulates the OS to hide its presence. 27. Social engineering concept that involves convincing trusting people to give up personal data. 28. Software that snoops on private information.
  • 6. 29. Software that copies itself over the Internet and contains malicious code. 30. Unsolicited commercial email. A. cookie B. data controller C. key D. key escrow E. trapdoor 31. Registering a key with a third party so it can be retrieved easily. 32. In the RSA scheme, requires a 129 digit sequence made of the product of two prime numbers. 33. The person setting policies for private information 34. Sending data to a third party before it is encrypted to bypass the usage of the key. 35. A record containing seven fields of information that uniquely identify a customer's session. A. absolute cell reference B. relative cell reference C. function D. foreign data E. delimited 36. Character symbolizing the end of each field (generally tab or semicolon)
  • 7. 37. A3 38. Data from another application to be imported into the spreadsheet 39. $A$3 40. MAX(A3:F3) A. conditional formatting B. conditional formulas C. symbolic reference D. literal reference E. filtering 41. Select only certain rows from a list. 42. Explicit column/row position 43. Make the entire computation of a cell contingent on the outcome of a condition 44. A word or phrase assigned to a cell or a range of cells 45. Applying an interpretation to the data and express that interpretation in an easy to see manner. A. root element B. entity C. data type D. atomic E. relationship
  • 8. 46. The tag that encloses all of the content of the XML file. 47. Number, text, image, etc. 48. Anything that can be identified by a fixed number of its characteristics. 49. A correspondence between rows of one table and the rows of another table. 50. Not decomposable into any smaller parts. A. programming B. assignment C. undefined D. Booleans E. compound statement 51. When a name is declared but no value is assigned yet. 52. True or false. 53. Changing the value of a variable. 54. Groups of statements surrounded by {}. 55. The act of formulating an algorithm into code. A. event handler B. onclick C. onchange D. dot operator E. event 56. The program that performs the task to respond to an event.
  • 9. 57. The event handling attribute for a button. 58. The event handling attribute for a text field 59. Provides a means of navigation to the proper object, selecting the property of an object. 60. An indication from the computer that something just happened. A. parameters B. call C. local variables D. global variables E. scope 61. Property that allows a local and global variable to share the same name. 62. Declared outside of any function, they can be used throughout the whole program. 63. Declared in a function and can only be used therein. 64. Run or execute the statements of the function to produce an answer. 65. Values the function will compute on, the input of the function. A. iteration B. initialization C. nested loop D. array E.handle 66. A loop within a loop. 67. Set the iterations variable's value for the first iteration of the loop.
  • 10. 68. Looping through a series of statements to repeat them. 69. A special code the computer uses to identify an object like a timer. 70. An indexed base name. A. evaluation function B. parallel computation C. metarules D. Universality Principle E. intractable 71. Rules that describe how to break or transcend existing rules. 72. Any computer can simulate any other computer using only simple instructions 73. The application of several computers to a task. 74. A problem that cannot be solved with a realistic amount of computer time on any computer. 75. A procedure that assigns a value to each piece and computes a score for each move. True/False (25 points) 76. One good method for creating a password is to take an acronym of something you like and
  • 11. substitute harder-to-guess pieces into it. A. True B. False 77. Passwords are generally stored in plain text to allow the administrator easy access. A. True B. False 78. A third-party cookie can use a loophole to get your information across different sites. A. True B. False 79. Backups are not a good idea for sensitive or important data. A. True B. False 80. Text that is too long for a cell to display is truncated. A. True B. False 81. To change a relative cell reference to an absolute reference, you should use the ampersand (&). A. True B. False
  • 12. 82. In the example we did in class, the trip being planned was to the Arctic Circle. A. True B. False 83. Spreadsheets can be sorted based on the current row, not by the current column. A. True B. False 84. Individual pages in a spreadsheet are called leafs. A. True B. False 85. Database users usually access logical views, not the physical database on the disk. A. True B. False 86. - can be a binary or unary operator. A. True B. False 87. JavaScript is mainly used for Web applications. A. True B. False 88. When evaluating a statement with an = in it, start on the left side and compute that first.
  • 13. A. True B. False 89. Joining two strings together using the + is called concatenation. A. True B. False 90. Radio button elements are used for both input and output. A. True B. False 91. It is illegal to put a button element inside an XHTML table cell. A. True B. False 92. Every function must have at least one parameter. A. True B. False 93. A random number generated in JavaScript is always between 0 and 1. A. True B. False 94. When a local and global variable have the same name, the global variable has priority in the function the local variable is declared in.
  • 14. A. True B. False 95. j++ is a shortcut that means add j + j. A. True B. False 96. An indexed item is called an element. A. True B. False 97. You can safely use an element that is past the bounds of the array. A. True B. False 98. NP-complete problems have no known "practical" algorithmic solutions. A. True B. False 99. Work-proportional-to-n algorithms take longer than work-proportional-to-n2 algorithms. A. True B. False 100. Select A. here because it is True that you are done with this class! A. True B. False