Final Exam Day 5 Flashcards
A cell ____________ is the coordinates of that cell.
Reference
The _____________ may be used to copy formulas to adjacent cells.
Fill handle
Use an ____________ function to determine the value of a cell based on a logical test.
IF
The ____________ function displays the smallest value in a range.
MIN
_________________ is an excel feature that looks for patterns in data and automatically fills or formats data in remaining cells.
Flash Fill
The term ___________ refers to all online or internet based attacks.
Cybercrime
____________ may download a virus onto a mobile device when an object on the display is tapped.
Key logging
______________ is the act of stealing digital equipment.
Hardware Theft
A ______________ examiner will inspect the contents of a computer or network to discover, collect an analyze evidence.
Digital Forensics
The most common form of software theft is _____________, which is the unauthorized and illegal duplication of software theft.
Software Piracy
A secure site is a website that uses ____________ techniques to secure its data.
Encryption
____________ is a scam in which an official looking email is used in an attempt to obtain information from you.
Phishing
A ____________ is a written guideline that helps determine whether a specification is ethical/unethical/not allowed.
Code of Conduct
A botnet is used to _____________.
Attach other networks.
A fingerprint reader, used to gain access to a computer, is an example of a ___________ device.
Biometric