To encrypt a workbook with a password

Assignment Help Basic Computer Science
Reference no: EM13926324

Question 1.

Which of the following is one of the most common file types imported into Excel?

Text

PowerPoint

Web

Word

Question 2.

Which of the following is NOT a text file?

Tab-delimited

Comma-separated value

XML

Fixed-width

Question 3.

Which of the following is NOT a method for refreshing data?

Click the Refresh All command.

Save the Excel workbook.

Click the Refresh All arrow, then click Refresh.

Right-click in a range of data and then select Refresh.

Question 4.

The Convert Text to Columns Wizard allows you to choose the file type, such as Delimited or ________ width.

Fixed

Mixed

Divided

Text

Question 5.

(TCO 8) Which of the following is a frequently used function to manipulate txt?

CONCATENATE

PMT

IF

DATE

Question 6.

To change the text string JANE doe to jane doe, use the ________ function.

CONCATENATE

PROPER

UPPER

LOWER

Question 7.

Which of the following will produce the same result as the CONCATENATE function?

=A4&B4

=A4+B4

=A4B4

=A4,B4

Question 8.

If you want to send a letter to all your customers using Mail Merge, and you already have the customers' names and

addresses stored in an Excel file, you should choose _________ from the Select Recipients menu while performing the merge.

Type New List

Use Existing List

Import from Excel

Select from Outlook Contacts

Question 9.

The New Comment command is located on the ________ tab.

View

Review

Data

File

Question 10.

If first and last names are combined in a single column, you can split them into two separate columns using the ________.

Split Names Wizard

PivotTable feature

CONCATENATE function

Convert Text to Columns Wizard

Question 11.

The command to track changes is located on the ________ tab.

File

Data

Review

View

Question 12.

If you have ________ configured as your e-mail client, you can e-mail an Excel file directly from Excel.

Gmail

Hotmail

Yahoo

Outlook

Question 13.

Windows can search for files by author name or keywords that have been entered into ________.

a file name

the Trust Center

document properties

cell A1

Question 14.

All EXCEPT ___________ are Excel functions that help you manipulate text.

PROPER

UPPER

SUBSTITUTE

RESPOND

Question 15.

To encrypt a workbook with a password, click Info on the File tab, click ________, and then select Encrypt with Password.

Check for Issues

Protect Workbook

Manage Versions

Options

Reference no: EM13926324

Questions Cloud

Describe your understanding of why the ifrs was created : Describe your understanding of why the IFRS was created, and how this will affect the accounting profession in terms of business relationships.
Chi-square goodness of fit test-unequal frequencies : An opinion poll was taken to see how people felt about Health Care reform. Previous poll results indicate that within a particular population 34% were for reform, 41% were against reform, and 25% were uncertain.
Redesign of the agency structure to serve : Recommend a redesign of the agency's structure to serve the needs of the department's businesses better without jeopardizing the goals / objectives of the agency. Explain your reasoning for changing the design and explain the change's impact on th..
What is the rate of heat loss through the glass : A glass window of width W = 1 m and height H = 2 m is 5 mm thick and has a thermal conductivity of kg = 1.4 W/m. K if the inner and outer surface temperatures of the glass are 15°C and -20°e, respectively, on a cold winter day, what is the rate of..
To encrypt a workbook with a password : Which of the following will produce the same result as the CONCATENATE function?
Evaluation of agency budgeting and cumulative report : As a consultant, you need to develop an in-depth analysis and evaluation of the selected agency's budgeting and then provide recommendations for improvement. Therefore, you will conduct interviews with agency representatives and research-related a..
How many mm of the ribbon will you require : How many grams of Mg must react with HCl in order to produce 40.0 ml of hydrogen gas at 22 degrees celsius and 1.02 bar?
How many containers of each product to produce tomorrow : Formulate and then solve a linear programming model of this problem, to determine how many containers of each product to produce tomorrow to maximize profits.
Prepare a cost of production summary for each department : Prepare a cost of production summary for each department for the month - Berg Products manufactures one product in two departments on a continuous basis and uses the average method of process cost accounting.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design application to accept reader data

Design an application that accepts reader data and produces a count of readers by age groups as follows: under 20, 20-29, 30-39, 40-49, and 50+.

  Penetration testing & vulnerability assessments

Penetration Testing & Vulnerability Assessments

  Examine at the development of technology

Examine at the development of technology over the last 10 years. How do you think we will be interacting with technology in 20 years time compared to now. Be imaginative.

  Public boolean chackanagram

write the anagramList() chackanagram. checkAnagram returns true if its two Word parameters have original words that are nagrams. If not, checkAnagram returns false. use the ethod header below to write checkanagram. Assume that all Word methods work a..

  How many rfid tags be produced annually meet that demand

suppose that each of the 300 million people in the united state fully consumes two packages of goods a day bearing RFID tags. how many RFID tags have to be produced annually to meet that demand

  Which of the following addresses are not allowed on internet

Which of the following addresses are not allowed on the internet?

  Evaluate online tutorials and online communities

Ray and Jason have just finished developing the documentation for a system your team recently completed. Ray insists that the documentation should be printed in booklet format and included with the system.

  Evaluation and collection of data for the intersection

Evaluation and collection of data for the intersection at Yorba-Linda Blvd. and Association Rd. Distribution of project activities equally among all the team members

  How write program stores two integers and allows user enter

How do you write a program that stores two integers and allows the user to enter a character. If the character is A, add the two integers

  Identify at least six examples of threats to information

Identify at least six examples of threats to information security

  What is incremental analysis how is it used by management

1. Our lecture states that relevant costs can also be viewed as avoidable costs. What does this mean? This is a very difficult concept, so help your classmates understand it!2. What is incremental analysis? How is it used by management?

  Construct a 3-bit counter using three d flip-flops

Construct a 3-bit counter using three D flip-flops and a selection of gates. The inputs should consist of a signal that resets the counter to 0, called reset, and a signal to increment the counter, called inc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd