Deck 10: Data Analysis With Power Tools and Creating Macros

Full screen (f)
exit full mode
Question
What internal device does a computer use to connect to a wired or a wireless network?

A) Motherboard
B) Hub
C) Switch
D) Network interface card
Use Space or
up arrow
down arrow
to flip the card.
Question
As you consider the different methods of sharing files,which of the following is a disadvantage of cloud computing?

A) The amount of space that files will take up on your computer.
B) The inability to access your files if you lose your Internet connection.
C) The files you will lose if your computer crashes.
D) How long it will take to access a backup of files.
Question
What hardware is essential to creating a home Wi-Fi network?

A) Printer
B) Router
C) Monitor
D) Ethernet cord
Question
If you want to share information with individuals who are internal to your organization,which type of network would you want to use?

A) Wired network
B) Intranet
C) Extranet
D) Virtual private network
Question
Which of the following statements is true about public networks?

A) Many public networks are not secure.
B) All public networks are free.
C) Your home network is a public network.
D) Hackers cannot intercept data transmitted over public networks.
Question
To protect a computer or a server,a(n)______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

A) ethernet
B) firewall
C) protocol
D) rootkit
Question
Devices on a _____ area network are connected via Bluetooth.

A) local
B) wide
C) metropolitan
D) personal
Question
You are dropping your friend back home after a night at the movies.From the car,she turns on the indoor lights in her home using an app on her phone.How is your friend able to do this?

A) She uses a hub at her home that she connects to through the app.
B) She has installed switches that interact with the installed app on her phone.
C) She has a home network with smart home devices.
D) She dialed into her home modem through the app and sent a command through the router.
Question
In order for your router to access Internet connections,it must be connected to a _____.

A) network
B) hub
C) switch
D) modem
Question
To protect confidential company information from hackers while at a work conference,you must be sure to use which of the following networks when accessing the Internet at a hotel?

A) Extranet
B) Intranet
C) Wireless network
D) Virtual private network
Question
A router is a system of two or more devices linked by wires,cables,or a telecommunications system.
Question
In a _____ network,each device on the network is attached to a central server.If the server fails,then the other devices will be unable to communicate,but if a connected device fails,then all other devices will still be able to communicate.

A) Bus
B) Ring
C) Star
D) Mesh
Question
Which of the following is not a resource able to be shared in a network?

A) Printers
B) Software
C) Motherboards
D) Files
Question
What type of network sends signals through airwaves and usually does not require cables?

A) Wired network
B) Intranet
C) Wireless network
D) Virtual private network
Question
Why is a cable modem classified as a digital model?

A) It only sends digital data over a digital line.
B) It sends and receives digital data over a digital line.
C) It only receives digital data over a digital line.
D) It uses copper wires to enable efficient digital data transfers.
Question
After receiving an email from what appeared to be your bank,why did you become suspicious that this was a phishing email?

A) It did not include a promotional offer.
B) It was written in an overly formal tone.
C) The signature was consistent with other emails from your bank.
D) It contained typos and other grammatical errors.
Question
What is an evil twin in the computer world?

A) A device infected with malware that an attacker uses to control the device remotely.
B) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
C) A type of malware that disguises itself as or hides itself in a legitimate file,and then causes damage to programs and data when opened.
D) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Question
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

A) Social engineering
B) A zombie attack
C) An evil twin
D) Spyware
Question
What does a DSL modem use to send and receive digital data?

A) Copper telephone wiring
B) Cable TV connections
C) A wireless router
D) A network interface card
Question
What is an ISP?

A) A telecommunications company that sells Internet access.
B) A communications device that connects to a communications channel.
C) A central point for cables in a network for data sharing,
D) A system of two or more devices linked by wires,cables,or a telecommunications system.
Question
To encrypt data sent between devices,a wireless network key that uses a series of letters and symbols is often used.
Question
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

A) They use adware filling your screen with unwanted advertisements until you click on one.
B) They overload the server with network traffic so webpages will not load.
C) They disguise the network as an evil twin.
D) They encrypt your computer data and hold it hostage until you pay a fee,usually with bitcoins.
Question
RFID is a network protocol used in credit cards,smartphones,and tickets to facilitate close-range communication.
Question
Which of the following could indicate a DoS attack on your company server?

A) Customers are required to enter personal information as they complete an order form.
B) Customers are receiving too many emails about special offers.
C) Customers cannot view the website on their device because the page will not load.
D) Customers cannot download the most recent newsletter.
Question
In a connected network,how are hubs and switches similar to one another?

A) They are interchangeable terms for the same hardware.
B) They provide a central point for cables in a network.
C) They transfer data to all devices.
D) They can only connect to a single device.
Question
Which of the following is true about broadband connections?

A) Broadband connections turn off after lack of activity for a period of time,similar to when computers go to sleep.
B) Broadband connections are "always-on" with devices connected to them.
C) Broadband connections are difficult to find as there are few of them around today.
D) Broadband connections require a wireless router in order to increase their speed.
Question
The Internet is an amazing invention.It can transmit data over a variety of network protocols whether you are close to a device or far away.As you think about all the different network protocols,how is it possible for companies to consider using drones to deliver packages?

A) The company would have to use RFID transmitted through radio signals.
B) The company would have to use an IrDA network protocol within close proximity.
C) The company would have to use NFC to facilitate close-range communication.
D) The company would have to use a high-speed data transmission with access to high bandwidth.
Question
If you connect to a Wi-Fi network that does not require a wireless network key,it is still secure enough to send private information because wireless networks encrypt all data anyway.
Question
After your last family vacation,everyone uploaded their photos to a NAS device so everyone would have access to view them.
Question
Wireless networks that are available in public places,such as hotels,restaurants,and coffee shops,are known as mobile hotspots.
Question
A modem can also function as what other piece of hardware?

A) A hub
B) A switch
C) A router
D) A network interface card
Question
As the new manager at your local grocery store,you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste.What type of network should you use?

A) VPN
B) Extranet
C) Wi-Fi
D) Intranet
Question
What is the U.S.Federal Communication Commission's role in regard to Internet access?

A) To rate Internet sites similar to movie ratings
B) To restrict Internet access by location and population
C) To regulate the bandwidth each website can have
D) To release rules surrounding Internet access
Question
Which of the following would be considered a strong password?

A) Password123
B) Abc123456789
C) CatCatCatCat
D) Wbcm2!4!820!
Question
When it comes to secure data storage on a network,which of the following statements is true?

A) Encrypted files are not able to be saved on a network attached storage device.
B) Passwords are the safest method for protecting files on a network.
C) Roles can be granted to individuals to view files and make changes to files on a network.
D) Files stored on a network are accessible to all who can access that network.
Question
4G and 5G networks provide slower speed data transmission.
Question
Which network protocol allows devices to communicate with each other over a short range,usually less than 30 feet/9 meters?

A) RFID
B) NFC
C) Bluetooth
D) IrDA
Question
Why does net neutrality affect Internet connections?

A) Because it is a global resource,Internet services can be restricted by content or bandwidth.
B) Because it selects websites by content,Internet services can be restricted by bandwidth.
C) Because it supports all websites in the same way,Internet services cannot be restricted by content or bandwidth.
D) Because it selects websites by amount of bandwidth needed,Internet services can be restricted by content.
Question
Which of the following statements is NOT true about a local firewall?

A) It is a physical device that acts as a protective barrier.
B) It is also called software firewall.
C) It is often built into a company's operating system.
D) It inspects data being transmitted to or from a network.
Question
How does a wireless network key work with an encrypted wireless network?

A) The wireless key is the encryption code needed by the receiver to decode the file.
B) The sending and receiving devices must know the wireless network key to communicate.
C) The wireless network needs the key to decode the data before sending.
D) The wireless network key is your password for logging onto an Internet email system to receive files.
Question
When using encryption from your home computer,how would you configure the router?

A) You can use the wireless router to set the encryption key and type of encryption.
B) You can use the wireless router to intercept encrypted information and block it from entering the network.
C) You can use the wireless router to verify the security certificate of the encrypted data being sent.
D) You can use the wireless router to encrypt and then decode the encryption on information sent and received.
Question
You are studying for your upcoming exam by taking sample quizzes online,your sister is streaming a tv show,your brother is playing an online game,and your parents are both checking email.As you try to go to the next page of questions,an error message pops up: Unable to display page.Why do you think this happened?

A) Because of net neutrality,your ISP provider has reduced its bandwidth to cut costs,slowing the Internet for you.
B) Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
C) Because of FCC rules,content that requires more bandwidth is given preference over content that does not require as much bandwidth.
D) Because of FCC rules,ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided.
Question
What is a MAC address?

A) A unique hardware address for your device
B) The connection needed to access to a cellular network
C) An IP address unique to Apple's MAC computers
D) An alternate name Internet Protocol version 6
Question
How will cellular networks challenge cable and DSL providers in the future?

A) Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services.
B) Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services.
C) Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.
D) Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.
Question
As Chief Financial Officer,you want to send the fourth quarter profit/loss spreadsheets to the president of the company.You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access.How could you send the report without worrying about someone else accessing it?

A) You could send a flash drive with the report on it that you have password protected with the president's name.
B) You could encrypt the data in the report that only you can decode.
C) You could send the email and then forget to attach the report causing the president to call and ask you about it.
D) You could encrypt the data and then use the company NAS device and assign permissions only to the president.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Data Analysis With Power Tools and Creating Macros
1
What internal device does a computer use to connect to a wired or a wireless network?

A) Motherboard
B) Hub
C) Switch
D) Network interface card
D
2
As you consider the different methods of sharing files,which of the following is a disadvantage of cloud computing?

A) The amount of space that files will take up on your computer.
B) The inability to access your files if you lose your Internet connection.
C) The files you will lose if your computer crashes.
D) How long it will take to access a backup of files.
B
3
What hardware is essential to creating a home Wi-Fi network?

A) Printer
B) Router
C) Monitor
D) Ethernet cord
B
4
If you want to share information with individuals who are internal to your organization,which type of network would you want to use?

A) Wired network
B) Intranet
C) Extranet
D) Virtual private network
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements is true about public networks?

A) Many public networks are not secure.
B) All public networks are free.
C) Your home network is a public network.
D) Hackers cannot intercept data transmitted over public networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
To protect a computer or a server,a(n)______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

A) ethernet
B) firewall
C) protocol
D) rootkit
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Devices on a _____ area network are connected via Bluetooth.

A) local
B) wide
C) metropolitan
D) personal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
You are dropping your friend back home after a night at the movies.From the car,she turns on the indoor lights in her home using an app on her phone.How is your friend able to do this?

A) She uses a hub at her home that she connects to through the app.
B) She has installed switches that interact with the installed app on her phone.
C) She has a home network with smart home devices.
D) She dialed into her home modem through the app and sent a command through the router.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
In order for your router to access Internet connections,it must be connected to a _____.

A) network
B) hub
C) switch
D) modem
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
To protect confidential company information from hackers while at a work conference,you must be sure to use which of the following networks when accessing the Internet at a hotel?

A) Extranet
B) Intranet
C) Wireless network
D) Virtual private network
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A router is a system of two or more devices linked by wires,cables,or a telecommunications system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
In a _____ network,each device on the network is attached to a central server.If the server fails,then the other devices will be unable to communicate,but if a connected device fails,then all other devices will still be able to communicate.

A) Bus
B) Ring
C) Star
D) Mesh
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not a resource able to be shared in a network?

A) Printers
B) Software
C) Motherboards
D) Files
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
What type of network sends signals through airwaves and usually does not require cables?

A) Wired network
B) Intranet
C) Wireless network
D) Virtual private network
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Why is a cable modem classified as a digital model?

A) It only sends digital data over a digital line.
B) It sends and receives digital data over a digital line.
C) It only receives digital data over a digital line.
D) It uses copper wires to enable efficient digital data transfers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
After receiving an email from what appeared to be your bank,why did you become suspicious that this was a phishing email?

A) It did not include a promotional offer.
B) It was written in an overly formal tone.
C) The signature was consistent with other emails from your bank.
D) It contained typos and other grammatical errors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
What is an evil twin in the computer world?

A) A device infected with malware that an attacker uses to control the device remotely.
B) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
C) A type of malware that disguises itself as or hides itself in a legitimate file,and then causes damage to programs and data when opened.
D) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

A) Social engineering
B) A zombie attack
C) An evil twin
D) Spyware
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
What does a DSL modem use to send and receive digital data?

A) Copper telephone wiring
B) Cable TV connections
C) A wireless router
D) A network interface card
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
What is an ISP?

A) A telecommunications company that sells Internet access.
B) A communications device that connects to a communications channel.
C) A central point for cables in a network for data sharing,
D) A system of two or more devices linked by wires,cables,or a telecommunications system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
To encrypt data sent between devices,a wireless network key that uses a series of letters and symbols is often used.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

A) They use adware filling your screen with unwanted advertisements until you click on one.
B) They overload the server with network traffic so webpages will not load.
C) They disguise the network as an evil twin.
D) They encrypt your computer data and hold it hostage until you pay a fee,usually with bitcoins.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
RFID is a network protocol used in credit cards,smartphones,and tickets to facilitate close-range communication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following could indicate a DoS attack on your company server?

A) Customers are required to enter personal information as they complete an order form.
B) Customers are receiving too many emails about special offers.
C) Customers cannot view the website on their device because the page will not load.
D) Customers cannot download the most recent newsletter.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
In a connected network,how are hubs and switches similar to one another?

A) They are interchangeable terms for the same hardware.
B) They provide a central point for cables in a network.
C) They transfer data to all devices.
D) They can only connect to a single device.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is true about broadband connections?

A) Broadband connections turn off after lack of activity for a period of time,similar to when computers go to sleep.
B) Broadband connections are "always-on" with devices connected to them.
C) Broadband connections are difficult to find as there are few of them around today.
D) Broadband connections require a wireless router in order to increase their speed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The Internet is an amazing invention.It can transmit data over a variety of network protocols whether you are close to a device or far away.As you think about all the different network protocols,how is it possible for companies to consider using drones to deliver packages?

A) The company would have to use RFID transmitted through radio signals.
B) The company would have to use an IrDA network protocol within close proximity.
C) The company would have to use NFC to facilitate close-range communication.
D) The company would have to use a high-speed data transmission with access to high bandwidth.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
If you connect to a Wi-Fi network that does not require a wireless network key,it is still secure enough to send private information because wireless networks encrypt all data anyway.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
After your last family vacation,everyone uploaded their photos to a NAS device so everyone would have access to view them.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Wireless networks that are available in public places,such as hotels,restaurants,and coffee shops,are known as mobile hotspots.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A modem can also function as what other piece of hardware?

A) A hub
B) A switch
C) A router
D) A network interface card
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
As the new manager at your local grocery store,you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste.What type of network should you use?

A) VPN
B) Extranet
C) Wi-Fi
D) Intranet
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
What is the U.S.Federal Communication Commission's role in regard to Internet access?

A) To rate Internet sites similar to movie ratings
B) To restrict Internet access by location and population
C) To regulate the bandwidth each website can have
D) To release rules surrounding Internet access
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following would be considered a strong password?

A) Password123
B) Abc123456789
C) CatCatCatCat
D) Wbcm2!4!820!
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
When it comes to secure data storage on a network,which of the following statements is true?

A) Encrypted files are not able to be saved on a network attached storage device.
B) Passwords are the safest method for protecting files on a network.
C) Roles can be granted to individuals to view files and make changes to files on a network.
D) Files stored on a network are accessible to all who can access that network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
4G and 5G networks provide slower speed data transmission.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Which network protocol allows devices to communicate with each other over a short range,usually less than 30 feet/9 meters?

A) RFID
B) NFC
C) Bluetooth
D) IrDA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
Why does net neutrality affect Internet connections?

A) Because it is a global resource,Internet services can be restricted by content or bandwidth.
B) Because it selects websites by content,Internet services can be restricted by bandwidth.
C) Because it supports all websites in the same way,Internet services cannot be restricted by content or bandwidth.
D) Because it selects websites by amount of bandwidth needed,Internet services can be restricted by content.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following statements is NOT true about a local firewall?

A) It is a physical device that acts as a protective barrier.
B) It is also called software firewall.
C) It is often built into a company's operating system.
D) It inspects data being transmitted to or from a network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
How does a wireless network key work with an encrypted wireless network?

A) The wireless key is the encryption code needed by the receiver to decode the file.
B) The sending and receiving devices must know the wireless network key to communicate.
C) The wireless network needs the key to decode the data before sending.
D) The wireless network key is your password for logging onto an Internet email system to receive files.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
When using encryption from your home computer,how would you configure the router?

A) You can use the wireless router to set the encryption key and type of encryption.
B) You can use the wireless router to intercept encrypted information and block it from entering the network.
C) You can use the wireless router to verify the security certificate of the encrypted data being sent.
D) You can use the wireless router to encrypt and then decode the encryption on information sent and received.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
You are studying for your upcoming exam by taking sample quizzes online,your sister is streaming a tv show,your brother is playing an online game,and your parents are both checking email.As you try to go to the next page of questions,an error message pops up: Unable to display page.Why do you think this happened?

A) Because of net neutrality,your ISP provider has reduced its bandwidth to cut costs,slowing the Internet for you.
B) Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
C) Because of FCC rules,content that requires more bandwidth is given preference over content that does not require as much bandwidth.
D) Because of FCC rules,ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
What is a MAC address?

A) A unique hardware address for your device
B) The connection needed to access to a cellular network
C) An IP address unique to Apple's MAC computers
D) An alternate name Internet Protocol version 6
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
How will cellular networks challenge cable and DSL providers in the future?

A) Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services.
B) Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services.
C) Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.
D) Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
As Chief Financial Officer,you want to send the fourth quarter profit/loss spreadsheets to the president of the company.You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access.How could you send the report without worrying about someone else accessing it?

A) You could send a flash drive with the report on it that you have password protected with the president's name.
B) You could encrypt the data in the report that only you can decode.
C) You could send the email and then forget to attach the report causing the president to call and ask you about it.
D) You could encrypt the data and then use the company NAS device and assign permissions only to the president.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.