You CANNOT insert buttons to run macros on the Quick Access Toolbar

Indicate whether the statement is true or false


FALSE

Computer Science & Information Technology

You might also like to view...

__________ is the function that delivers a key to two parties who wish to exchange secure encrypted data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To sort and filter data on an Excel worksheet, click the Sort & Filter button on the ________ tab

A) FILE B) HOME C) DESIGN D) PAGE LAYOUT

Computer Science & Information Technology

A virtual assistant can be activated through voice command to ask for information

Indicate whether the statement is true or false

Computer Science & Information Technology

Match each of the following terms to its meaning:I.spear phishingII.rootkitIII.scarewareIV.zombieV.spywareA.program that allows hackers to gain access to your computer without your knowledgeB.malware on your computer used to convince you that your computer has a virusC.a computer controlled by a hackerD.sending e-mails to people known to be customers of a company to get individuals to reveal sensitive dataE.transmits information about you, such as your Internet-surfing habits

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology