ITM 207 FINAL EXAM QUESTIONS AND
ANSWERS (VERIFIED AND UPDATED)
211. Which of the following is the process of ensuring that data is protected from unauthorized
access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - ANS Answer Key: C
209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - ANS C
208. Which of the following is data appended to a message to ensure the authenticity of the
message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
@2026/2027 ALLRIGHTS RESERVED.
,D. substitution cipher
E. transposition cipher - ANS Answer Key: C
hich of the following is used to retrieve data from a database?
A. record
B. key
C. field
D. query
E. table - ANS Answer Key: D
205. Which of the following is the field of study related to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - ANS Answer Key: B
203. Which of the following database elements is composed of a set of related data items, such
as a person's name, address, and id number?
A. record
B. key
C. field
D. query
E. table - ANS Answer Key: A
202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
@2026/2027 ALLRIGHTS RESERVED.
, C. formula
D. cell
E. circular reference - ANS Answer Key: D
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - ANS Answer Key: B
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - ANS Answer Key: B
196. Which of the following represents a formula in a spreadsheet?
A. G14..H27
B. J24
C. A3..A7
D. =J24/J23
E. 15B - ANS Answer Key: D
195. Which of the following represents a single-column range in a spreadsheet?
A. G14..H27
B. J24
@2026/2027 ALLRIGHTS RESERVED.
ANSWERS (VERIFIED AND UPDATED)
211. Which of the following is the process of ensuring that data is protected from unauthorized
access?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - ANS Answer Key: C
209. Which of the following is used to perform a calculation in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - ANS C
208. Which of the following is data appended to a message to ensure the authenticity of the
message?
A. public-key cryptography
B. cryptanalysis
C. digital signature
@2026/2027 ALLRIGHTS RESERVED.
,D. substitution cipher
E. transposition cipher - ANS Answer Key: C
hich of the following is used to retrieve data from a database?
A. record
B. key
C. field
D. query
E. table - ANS Answer Key: D
205. Which of the following is the field of study related to encoded information?
A. integrity
B. cryptography
C. confidentiality
D. availability
E. cipher - ANS Answer Key: B
203. Which of the following database elements is composed of a set of related data items, such
as a person's name, address, and id number?
A. record
B. key
C. field
D. query
E. table - ANS Answer Key: A
202. Which of the following designates a single location in a spreadsheet?
A. what-if
B. range
@2026/2027 ALLRIGHTS RESERVED.
, C. formula
D. cell
E. circular reference - ANS Answer Key: D
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - ANS Answer Key: B
199. Which of the following is used to specify a set of adjacent elements in a spreadsheet?
A. what-if
B. range
C. formula
D. cell
E. circular reference - ANS Answer Key: B
196. Which of the following represents a formula in a spreadsheet?
A. G14..H27
B. J24
C. A3..A7
D. =J24/J23
E. 15B - ANS Answer Key: D
195. Which of the following represents a single-column range in a spreadsheet?
A. G14..H27
B. J24
@2026/2027 ALLRIGHTS RESERVED.