0 of 60 Questions completed
Questions:
You must fill out this field. |
|
You must fill out this field. |
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 60 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Congratulations, You have met the requirements for the membership of the Association.
When setting up employee defaults, the “Memo” checkbox is used when you want employee records
What inventory method does Sage 50 accounting software uses?
Sage 50 has many Job reports providing useful information for the users. The report includes ______
To see how much was billed to merchant bank for employee Alfred’s time, select _________
When recording the chart of accounts, the field you use to classify financial Statement account is called ______
When paying vendors, minus a return of merchandise, what will you do?
When printing customers sales invoice, the choice of sales invoice forms includes _________
The maintain/default information/employee window includes folder tabs for the following:
Which of the following type of files may be imported from another accounting program into Sage 50?
The maintain pull-down menu allows you to update the following data
Accruing expenses and accruing revenue adjusting entries can be made using the________
For accruing fee revenue, for service performed but not invoiced, which account is debited?
Which of the following is not an alternative to reverse a journal entry?
Which of the following is NOT an example of adjusted asset?
To display a list of customers in sales/invoicing customer ID text box, the following may be used:
To edit company information on Sage 50, the following step is applicable.
One of the following is NOT part of General Ledger report.
One of the following is NOT found in Reports & Forms Menu in Sage 50.
All the following EXCEPT one are found in Account Payable Reports submenu.
Computer forensics as the process of methodically examining computer media for evidence is also referred to as these EXCEPT
The computer forensics specialist needs to complete an Evidence Identification and _______ checklist as one of the steps taken to retrieve possible evidence.
Of the two (2) distinct components of cyber forensics technology the component that involves gathering digital evidence that is distributed across large-scale, complex networks is called
_________ involves the preservation, identification, extraction, and documentation of computer evidence stored in the form of magnetically encoded information (data).
A _________ is a system or group of systems that enforces an access control policy between two networks.
Security services that are important to protecting a corporation’s strategic information include the following EXCEPT
SAN as a type of Computer Forensic System mean
The following are branches of Digital Forensics EXCEPT
The branch of digital forensics that deals with collecting data from system memory in raw form and then carving the data from raw dump is called
The United States Department of Justice proposed a four-phase model of digital forensic processes which includes all of the following EXCEPT
One of the following is NOT one of the purposes of Digital forensics
Cybercrimes can be categorized as either internal or external events.
Computer crime is often referred to as an insider crime.
The best approach for organizations wanting to counter cybercrime is to apply ________ techniques.
One of these is a step taken in the threat identification process
One of the following is NOT an obstacle to backing up applications.
Successful data backup and recovery is composed of these key elements EXCEPT
The two simple reasons for collecting evidence are future prevention and responsibility.
The different types of evidence are testimonial and witness.
Exculpatory Evidence is
______ is the process of creating a replica system and luring the attacker into it for further monitoring.
The things left behind by the attacker like code fragments, trojaned programs or sniffer log files whenever a system is compromised is called
A method that involves limiting what the attacker can do while still on the compromised system, so he can be monitored without (much) further damage is called _______
One of these is NOT a rule of collecting electronic evidence.
Of the rules of collecting electronic evidence, Admissible is the most basic rule.
Microsoft Excel package helps one to do the following EXCEPT
Microsoft Excel is a part of the ___________ program
As a tool in the world of business, Microsoft Excel has capabilities in all these fields EXCEPT
The intersection of a column and a row in Excel package is called
A Cell can contain any of the following types of information EXCEPT
One of the following is NOT applicable to Financial Accounting in Microsoft Excel
One of the following is NOT applicable to Financial Management in Microsoft Excel
One of the following is NOT a method used in designing an amortization schedule
One of these is NOT a type of cell reference in Microsoft Excel
A group of related data points is called _____
The _________ displays the name of workbook which is currently open in MS. Excel.
The tools bar provides shortcut icons in form of pictures which a user can click on to perform a given task.
The status bar can be used to adjust the text size (in percentage) of work on a spreadsheet.
Absolute referencing is used where you do not want the cells referred to in formula to change when you drag it to cover other cells.
Accounting models are templates containing formulas to ease preparation of financial statements.
In Sage 50, Cashbook is part of General Ledger report.