CAS CS 62775

subject Type Homework Help
subject Pages 12
subject Words 1480
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Once an audio clip is inserted into a slide, you cannot specify options that control
playback and appearance.
a. True
b. False
To clear a filter, tap or click the ____ button on the HOME tab and then tap or click
Clear All Filters.
a. Filter
b. Remove
c. Advanced
d. Select
Which of the following is your library using because it costs less, is easier to maintain,
and uses less power than desktop computers?
a. ultrabook
b. tablet
c. thin client
page-pf2
d. mainframe
The default PowerPoint view is ____ view.
a. Slide Sorter
b. Notes Page
c. Normal
d. Slide Show
Which of the following is a popular social networking site?
a. Facebook
b. Chrome
c. Safari
d. Internet Explorer
page-pf3
PowerPoint ____ should reinforce the speaker's message and help the audience retain
the information presented.
a. events
b. slides
c. markers
d. files
Which of the following is a collection of data organized in a manner that allows access,
retrieval, and use of that data?
a. spreadsheet
b. formula
c. database
d. functional set
page-pf4
Which of the following is not a part of a server?
a. processor
b. network connections
c. storage
d. bundled software
Reading view is similar to ____ view because each slide displays individually, but the
slides do not fill the entire screen.
a. Slide Sorter
b. Slide Show
c. Normal
d. Notes
Which of the following has the same intent as a cracker, but does not have the technical
skills and knowledge?
a. hacker
b. script kiddie
page-pf5
c. cyberextortionist
d. cyberterrorist
The ____ print style prints five weeks per page of a particular month or date range.
a. Monthly
b. Weekly Calendar
c. Tri-fold
d. Calendar Details
The types of services offered by cloud storage providers vary.
a. True
b. False
page-pf6
Which of the following is any event or action that could cause a loss of or damage to
computer hardware, software, data, information, or processing capability?
a. digital security risk
b. information liability
c. technical terrorism
d. network compromise
____ is required information for a citation for a Web site in MLA style.
a. Date viewed
b. Page numbers
c. Title of Web site
d. Web site publisher or sponsor
How much do fingerprint readers typically cost?
page-pf7
a. less than $10
b. less than $100
c. between $250 and $500
d. more than $1000
Some shareware developers render their software useless if no payment is received after
the trial period expires.
a. True
b. False
Human speech is digital.
a. True
b. False
page-pf8
A blog is an informal website consisting of time-stamped articles in a diary or journal
format, usually listed in reverse chronological order.
a. True
b. False
The column boundary, the border to the right of a column, can be dragged until a row is
at a desired height.
a. True
b. False
A flagged word is one that is misspelled.
a. True
b. False
page-pf9
Though an invitee can propose a new meeting time, only the ____ can change or delete
the meeting.
a. originator
b. attendee
c. navigator
d. scheduler
Which of the following kinds of UPS always runs off a battery?
a. offline UPS
b. UPS utility
c. standby UPS
d. online UPS
page-pfa
According to the MLA style, the first line of each entry on the works cited page begins
at the left margin.
a. True
b. False
The ____ View allows you to view multiple calendars over the course of a single day in
a horizontal layout, as shown in the accompanying figure.
a. Schedule
b. Month
c. Day
d. Backstage
To enter a blank line into a document, press the ____ key without typing any text on the
line.
a. CTRL
b. ALT
c. ENTER
page-pfb
d. ESC
To apply a style to a paragraph, the first step is to position the insertion point in the
paragraph.
a. True
b. False
A disadvantage with a subject directory is that users sometimes have difficulty deciding
which categories to choose as they work through the menus of links presented.
a. True
b. False
page-pfc
COPPA requires that schools and libraries use content filtering software in order to
receive certain federal funds.
a. True
b. False
Using Point mode to enter formulas often is faster and more accurate than using the
keyboard to type the entire formula.
a. True
b. False
What kind of server is another computer that screens all your incoming and outgoing
messages?
a. proxy
b. pop-up
c. phishing
d. filter
page-pfd
A meeting is an event that you invite other people to attend.
a. True
b. False
When you install PowerPoint, the default setting allows you to reverse up to the last
____ changes by tapping or clicking the Undo button on the Quick Access Toolbar.
a. 2
b. 20
c. 12
d. 200
Which of the following is the process of initiating contact between two Bluetooth
page-pfe
devices and allowing them to communicate with each other?
a. streamlining
b. discovering
c. docking
d. pairing
Helps add emphasis or depth to characters
What can you tell him about the types of malware that exist and how the different types
might affect his computer?
page-pff
Available free at portals on the web and included with paid Internet access service
An assault whose purpose is to disrupt computer access to an Internet service
You can access Office 365 services using your computer, tablet (Windows, iPad, or
Android), any browser, or supported _________________________.
A(n) ____________________ cell reference instructs a paste operation to keep the
same cell reference as it copies a formula from one cell to another.
page-pf10
Under what circumstances should you press the ENTER key when typing in Word?
A(n) ____________________ signals an end to an email message using words such as
"Thank you" or "Regards."
page-pf11
The total number of rows and columns required in a table.
Track important dates
When a headline is ____________________, it is positioned horizontally between the
left and right margins on the page.
After reviewing slides, you can change the view to ____________________ so that you
may continue working on a presentation.
page-pf12
Field can contain any characters and the total numbers of characters cannot exceed 255.
The term ____________________ describes an attack whose goal ranges from
disabling a government's computer network to crippling a country.
The practice of sharing or pooling computing resources, such as servers and storage
devices

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.