When PowerPoint starts, it displays a blank presentation in ____ view. |
Normal |
Normal view displays slides one at a time in the ____. |
Slide pane |
The ____ is the first slide in a PowerPoint presentation. |
Title slide |
There are ____ text placeholders on the Title slide. |
2 |
A commonly used layout is the ____ layout. |
Title and Content |
To insert a new slide, you use the New Slide button in the ____ group on the HOME |
Slides |
A ____ item is a main item in a list. |
first-level |
Text is measured in ____. |
points |
____ adjusts default font sizes and line spacing to make the text fit. |
AutoFit |
To duplicate, rearrange, or delete slides, you select the slides in the Slides tab in ____ view or switch to Slide Sorter view. |
Normal |
Click the "Return to the previous slide" and "____ to the next slide" buttons to move from slide to slide in Slide Show view. |
Advance |
If you have closed a saved presentation, open it in Backstage view by using the ____ command. |
Open |
To edit a presentation without changing the original, create a copy of it. To do this, use the ____ command. |
Save As |
A ____ is a coordinated set of colors, fonts, backgrounds, and effects. |
theme |
A theme and its variants are called a theme ____. |
family |
If you don't choose a theme, the default ____ theme is applied. |
Office |
To apply a theme from a presentation stored on your computer or network, click the ____ button, and then click Browse for Themes. |
Themes More |
A(n) ____, like any presentation, has a theme applied, but it also contains text, graphics, and placeholders to help direct you in creating content for a |
template |
To find a template on Office.com, display the ____ or New screen in Backstage view. |
Recent |
You can use the Picture button in the Images group on the ____ tab to add photos to slides. |
INSERT |
In PowerPoint terms, ____ a photo means cutting out the parts you don't want to include. |
cropping |
When you save a presentation that contains photos, PowerPoint automatically compresses the photos to a resolution of ____ pixels per inch (ppi). |
220 |
If photos need to be emailed or uploaded to a Web page, choose the ____ ppi compression setting. |
96 |
When you choose the ____ compression setting, photos are compressed to the resolution specified on the Advanced tab in the PowerPoint Options |
Document resolution |
____ handles are the small squares that appear in the corners and in the middle of the sides of the border of a selected object. |
Sizing |
The ____ ratio is the ratio of an object's height to its width. |
aspect |
____ notes are information you add about slide content to help you remember to bring up specific points during the presentation. |
Speaker |
To indicate that a word might be misspelled, a ____ squiggly line appears under it. |
red |
During your presentation, you can easily display a blank black slide by pressing the ____ key(s). |
B |
____ view displays the slides so that they almost fill the screen, and a status bar appears identifying the number of the current slide and providing |
Reading |
When you print ____, the presentation is printed with one or more slides on each piece of paper. |
Handouts |
When you are finished working with a presentation, you can exit PowerPoint. If there is only one presentation open, you click the Close button in the |
upper-right |
After opening PowerPoint, Ethan sees buttons to execute commands in the ____ area. |
Ribbon |
PowerPoint files consist of what looks like pages in a document. Ethan correctly calls these buttons ____. |
slides |
Ethan has not saved his PowerPoint file yet, and it appears with a temporary filename "____" followed by a number. |
Presentation |
When Ethan first opens PowerPoint, he has two ____ view options: 1) to open an existing presentation or 2) to create a new file. |
Backstage |
When Ethan first creates a new presentation it is displayed in ____ view. |
Normal |
Ivan tells Kamilla that the first slide of her presentation will be the ____ slide. |
Title |
Once Kamilla decides to work with the Title slide she sees that it has two ____. |
text placeholders |
When Kamilla clicks in the Title placeholder, the insertion point appears as a ____ line in the center of the placeholder. |
blinking |
When Kamilla clicks in the Title placeholder a contextual tab, the ____ tab, appears on the ribbon. |
DRAWING TOOLS FORMAT |
Kamilla has run out of room on her computer's hard drive, so Ivan helps her upload the file to her account on ____, Microsoft's free online storage |
OneDrive |
The DRAWING ____ FORMAT tab appears when a drawing or a text box—including the slide's title and content placeholders—is selected. |
TOOLS |
To insert a shape, click a shape in the Shapes ____. |
gallery |
Draw the ____ adjustment handle on a shape to change its proportions without changing the size of the shape. |
yellow |
Use the ____ Picture button to undo formatting and sizing changes you made to a picture. |
Reset |
Like shapes, you can rotate or ____ pictures using the Rotate handle or the Rotate button. |
flip |
An installed theme can be applied by clicking on a theme in the Themes group on the ____ tab. |
DESIGN |
If you need to use a custom theme frequently, you can save a presentation file as a(n) ____ Theme file. |
Office |
To draw a shape, click the Shapes button in the Illustrations group on the _____ tab, click a shape in the gallery, and then click and drag to draw the |
INSERT |
A ____ is shading in which one color blends into another or varies from one shade to another. |
gradient |
To flip an object, you use the Flip commands on the Rotate button menu in the ____ group on the DRAWING TOOLS FORMAT tab. |
Arrange |
To insert a table, in a content placeholder, click the INSERT tab on the ribbon, click the Table button in the ____ group, and then click Insert Table. |
Tables |
When you use the Borders button arrow, the borders will be the style, weight, and color specified by the Pen Style, Pen Weight, and Pen Color |
Draw |
Use the Animation ____ to copy the animation, effects, and duration applied to one object to another object. |
Painter |
If you animate a list, the default is for the first-level items to appear ____. |
one at a time |
Sequence options appear on the Effect Options menu in addition to the ____ options when an animation is applied to a text box. |
Direction |
The Add or Remove Columns button in the Paragraph group on the ____ tab allows you to create multiple columns in a text box. |
HOME |
The most commonly used video formats are the MPEG-____ format, the Windows Media Audio/Video format, and the Audio Visual Interleave |
4 |
After you insert a video, you can modify it by changing ____ options, changing the length of time the video plays, and applying formats and styles to |
playback |
To insert video stored on your computer or network, click the Insert Video button in a content placeholder, and then in the Insert Video window next |
From a file |
The start timing setting is on the VIDEO TOOLS PLAYBACK ____. |
tab |
Media ____ category appears only when a media object—either video or audio—is selected on a slide. |
animation |
If you see a black square when you insert a video, you can override this by setting a ____ frame. |
poster |
If a video is too long, or if there are parts you don't want to show during the slide show, you can ____ it. |
trim |
When you choose the ____ compression level for videos the file will be compressed slightly and will maintain the quality of the videos. |
Presentation Quality |
When you choose the ____ compression level for videos the file will be compressed as small as possible. |
Low Quality |
When you choose the ____ compression level for videos the file will be compressed to a quality suitable for streaming over the Internet. |
Internet Quality |
To compress the videos in a presentation, click the Compress ____ button. |
Media |
The Info screen in Backstage view contains a(n) ____ Media button as well as the Compress Media button. |
Optimize |
Usually the date and slide number do not need to appear on the ____. |
title slide |
Clicking either the Date & Time button or the ____ button opens the Header & Footer dialog box. |
Slide Number |
In common usage, a(n) ____ is any text that appears at the bottom of every page in a document or every slide in a presentation. |
footer |
Kyle wants to change the thickness of one of the shape outlines. Thickness is another word for ____. |
weight |
Kyle wants to add a 3D rotation to highlight one of the mountain ranges. To do this he clicks the Shape ____ button. |
Effects |
Kyle easily adds new shapes to a timeline. He simply clicks the shape he needs in the Shapes ____. |
gallery |
To open a menu of Rotate and Flip commands, Kyle clicks the ____ button. |
Rotate |
To add visual interest, Kyle changes the ____ of the shape's border by changing the solid outline to a dashed line. |
style |
John tells Merlia that it is often best to use the same slide transition consistently. He shows her the ____ button which applies the transition to all the |
Apply to All |
After working for a while, Merlia wants to see how the transitions look. John shows her that there is a ____ button on the TRANSITIONS tab to |
Preview |
Merlia wants all of her slides to come "From Right" except the last slide. She can change the last slide to come "From Top" by clicking the ____ |
Effect Options |
To change the speed of a transition, John shows Merlia how to change the ____. |
duration |
A ____________is a pocket-sized device that typically connects to a smartphone or portable computer to enable the device to display an image on a wall. |
pico projector |
One of the key enhancements in the newest Bluetooth specification known as _____________ is low energy, which enables small devices to run for years on a |
Bluetooth Smart |
The new ApplePay service uses which technology? |
Near Field Communications (NFC) |
Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly. |
silicon |
____ chips have a special coating that changes its physical state when heat is applied. |
PRAM |
Google Glasses are an example of a technology called ______.. |
wearable display |
____ displays are transparent; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly transparent as glass, so the user can see through the screen. |
TLED |
Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images. |
external |
To record data, holographic storage systems split the light from a blue laser beam into two beams-a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data. |
reference |
With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM), which translates the data's 0s and 1s into a |
spatial |
Today's holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, with current capacities ranging from GB to ____ GB per cartridge. |
500 |
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations. |
optical |
While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ |
opto-electronic |
One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ videoconferencing. |
telepresence |
Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables. |
electrical |
Developed in the late 1990s, Wi-Fi (for wireless fidelity) is a family of wireless networking standards that use the IEEE standard ____. |
802.11 |
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____. |
all of the above |
____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics. |
Artificial intelligence |
Self-driving cars, such as Google's autonomous cars, are a form of _____. |
robotics |
The ____ Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and |
Semantic |
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations-for example, the systems that check products defects at manufacturing plants. |
vision |
When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information |
expert |
A(n) ____ network, like the one used by the technology in the accompanying figure, is designed to emulate the brain's pattern-recognition process in order to |
neural |
Home monitoring systems designed for the home include ______________ . |
all of the above |
Telesurgery is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient, and which typically uses ____ to give the human |
cameras |
____ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are |
DARPA |
An emerging military robotic application is the ____ suit, which is a wearable robotic system designed to give an individual additional physical capabilities and |
exoskeleton |
Telesurgery is typically ____ than normal surgery. |
both a and b |
Flexible displays commonly use _____ technology. |
OLED |
In her presentation, Sam explains that, to record data, holographic storage systems split the light from a blue laser beam into two beams, and that it is the ____ whose angle determines the address used to store data at that particular location on the storage medium. |
reference |
Sam explains that to record data, holographic storage systems split the light from a blue laser beam into two beams, and that the ____ beam contains the data. |
signal |
Sam explains that the signal beam passes through a device called a spatial light modulator (SLM), which translates the data's 0s and 1s into a hologram—a three dimensional |
checkerboard |
According to Sam's presentation, the two beams intersect within the recording medium to store the hologram at that location by changing the optical ____ of the |
density |
Researchers recently demonstrated the ability to store data __________ in synthetic crystals, which may eventually lead to a disc that can store 360 TB of data be stable enough to essentially last forever. |
in 5D |
Computer crime is sometimes referred to as ____. |
cybercrime |
Texplain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for |
codes of conduct |
____ refers to the act of breaking into a computer or network. |
Hacking |
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country. |
the United States |
Defenders of _______ state that, unless individuals or businesses protect their wireless access points, they are welcoming anyone to use them. |
war driving |
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, |
Wi-Fi piggybacking |
____ are the most common form of possessed knowledge used for security purposes. |
Passwords |
____ can identify users by voiceprint or retina scan. |
Biometric access systems |
Increasingly, many people use USB security keys, also called USB security _________ USB flash drives inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features. |
tokens |
____ identify users by a particular unique biological characteristic. |
Biometric access systems |
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized |
firewall |
____ uses a single secret key to both encrypt and decrypt the file or message. |
Private key encryption |
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts |
Hushmail |
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network. |
virtual private network |
____ software can control which devices can be connected to an employee's computer. |
Data-leakage prevention |
____ includes any acts of malicious destruction to a computer or computer resource. |
Computer sabotage |
A computer that is controlled by a hacker or other computer criminal is referred to as a ____. |
bot |
____ is a generic term that refers to any type of malicious software. |
Malware |
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the |
virus |
Like a computer virus, a ____ is a malicious program designed to cause damage. |
computer worm |
A ____ is a malicious program that masquerades as something else—usually as some type of application program. |
Trojan horse |
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network. |
worm |
One emerging type of Trojan horse is called a ____-Access Trojan. |
Remote |
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis. |
threat definitions |
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____. |
dot cons |
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually |
Identity theft |
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive. |
Identity theft |
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites. |
typosquatting |
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities. |
Pharming |
The best protection against many dot cons is ____. |
common sense |
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature. |
public |
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate. |
EV |
Repeated threats or other harassment carried out online between adults is referred to as ____. |
cyberstalking |
Our networked society has raised a number of ____ concerns. |
privacy |
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be |
1,000 feet |
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computerrelated |
system failure |
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks. |
security slot |
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object. |
Cable locks |
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) |
FDE |
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN. |
encrypted |
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____. |
recovery |
____ devices are designed to withstand much more physical abuse than conventional devices. |
Ruggedized |
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag. |
sleeves |
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being |
Rugged |
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the |
UPS |
Organizations should have a _____ for their computer systems. |
disaster recovery plan |
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy. |
backup |
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations |
hot site |
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____. |
7 to 10 years |
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used. |
information piracy |
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the |
Marketing databases |
A marketing activity that can be considered a privacy risk is ____. |
electronic profiling |
Collecting in-depth information about an individual is known as ____. |
electronic profiling |
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will |
privacy policy |
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, |
throw-away e-mail address |
One common way to deal with spam that makes it to your computer is to use a(n) ____. |
e-mail filter |
By ____, you instruct companies you do business with that they cannot share your personal data with third parties. |
opting out |
To ____ means to request that you be included in marketing activities or that your information be shared with other companies. |
opt in |
____ is used specifically for the purpose of recording keystrokes. |
Key logger |
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. |
Video surveillance |
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both |
Video surveillance |
____ refers to companies recording or observing the actions of employees while on the job. |
Employee monitoring |
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____. |
proximity cards |
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status. |
Presence technology |
______ programs can be used to detect and remove some types of illegal computer monitoring and spyware software. |
Antispyware software |
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry. |
CAN-SPAM act |
The availability of high-quality, full-color imaging products (such as scanners, color printers, and color copiers) has made _________ easier and less costly than in the recent past. |
digital counterfeiting |
Use a _____ to protect your computer from lightning strikes when it is plugged in. |
surge suppressor |
One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case? |
kill switch hard drives |
Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her |
asset tags |