CSCI 190 Part 2
Toggle
A button that can be turned on by clicking it once and turned off by clicking it again is called a ____.
Embedded Code
A code that creates a link to a video, picture, or other type of rich media content is called a _____.
Keyboard shortcut
A combination of two or more keyboard keys used to perform a task that would otherwise require a mouse is a _____.
Gadget
A dynamic program, such as a clock, a stock market ticket, or a weather window that displays on the desktop is called a ________.
Bulleted list
A list of items which has each item introduced by a symbol is a ___________.
Tab stop
A mark on the ruler that indicates the location where the insertion point will be placed when you hit tab is called the ____.
Template
A pre formatted document that you can use as a starting point and then change to suit your needs is a _____.
Snipping tool
A program that captures a screen or part of a screen
Windows explorer
A program that enables you to create and manage folders and copy, move, sort, and delete files.
Footer
A reserved area for test of graphics that displays at the bottom of each page in a document
Operating system
A set of instructions that coordinates the activities of your computer called the _______.
Paint
A simple drawing program incorporated with windows 7 is...
Mini toolbar
A small toolbar containing frequently used formatting commands that displays as a result of selecting texts or objects.
Information tab
A tab in backstage view that displays information about the current file is the _____.
Object
A text box, picture, table, or shape that you can select and then move and resize is called an _____.
Harassing
An individual that threatens another individual via electronic communications is ________ the victim.
Command
An instruction to a computer program that causes an action to be carried out
Cell address
Another name for a absolute cell reference is the ______.
No
Are chemical patents real? Yes/No
Unethical
Behaving in a manner that does not conform to a set of approved behavioral standards is ______?
Interactive media
Computer interaction that responds to your actions is called _____.
Rich Media
Computer interactions that respond to your actions such as text, graphics, animation, video, audio, and games are called ____.
Book or periodical
Contact the author of publisher if you are seeking permission to use either a _______or______.
Metadata
Custom file properties, such as names, places and descriptions that are added to files are called _____?
No
Does the amount you are willing to pay if the permission is granted to use copyrighted materials need to be included in the request? Yes/No
Font styles
Formatting emphasis such as bold, italic, and underline are _______.
Author's life plus seven years
How long does the copyright of an original work granted for?
Confidential
If you are in possession of information about an individual and don't know if that person would want that information disclosed then you should keep the information ________?
Quick access toolbar
In an office program window, the small row of buttons in the upper left hand corner of the screen from which you can perform frequently use commands is the ____.
Navigation
In the windows explorer window, the pane that displays favorites, libraries, computer and network information is called the _____ pane?
Industrial espionage
In the workplace, spying on your competitors to gain access to sensitive information is called _____?
No
Is "Thou shall not use anonymity" one of the commandments of computer ethics? Yes?No
No
Is car jacking a white collar crime? Yes/No
Yes
Is deleting a bad video of someone else upholding and demonstrating ethical behavior? Yes/No
Netiquette
Most schools and businesses adopt _____ to establish guidelines for computer usage.
4th
Our forefathers did not directly address the right of individual privacy to us; however the _____ amendment to the constitution does refer to the right of people to be secure.
Illegal
Parking your car in a handicap spot with a handicap permit that belongs to your grandma is _____?
Unethical
Posting a picture on facebook and tagging your friend without his or her permission is _____?
Western
Privacy or secrecy is viewed as an inalienable right in the _____ culture?
Real and personal
Property comes in what two general types?
Keystone loggers
Software programs that record every keystroke that you make on your computer are called _____.
Bullets
Text symbols such as small circles or check marks that introduce items in a list are called _____.
Illegal
Texting while driving is _____ in most states.
File extension
The 3 or 4 characters to the right of the period in a file name is called the ______?
Details pane
The ______ displays information about the drive, folder, or filed selected in the content pane.
Placeholder text
The _________ is non-printing text that holds a place in a document where you can type.
Dragging
The action of holding down the left mouse button while moving your mouse is called ____?
Notification area
The area on the right side of the task bar that keeps us informed about processes that are occurring in the background is the ____?
Pointer
The arrow, I-beam or other symbol that shows the location or position of the mouse on your screen is the _______.
Horizontal scroll bar
The bar at the bottom of the window that enables you to move left and right
Vertical scroll bar
The bar on the right side of a window that enables you to move up and down to view information that extends beyond the top and bottom of the screen is the __________.
Line spacing
The distance between the lines of a text in a paragraph is called the ____.
Name box
The element in the excel window that displays the name of the selected cell, table, chart, or object is called the _____.
Chart
The graphic representation of data in a worksheet is called a _____.
1st sale doctrine
The legal principle that allows public libraries to lend out copyrighted materials is the ______.
Texting
The only exception to communication monitoring of an employee by an employer is ______.
Fill handle
The small black square in the lower right corner of a selected cell is the_____.
Cyber bullying
The use of digital technology to harass, threaten, humiliate, or torment another individual is called ______.
Trade dress
The visual appearance of a product or its packaging is the _________.
Trademark
The word "intel" in blue surrounded by a blue circle is an example of a ________.
Desktop
The working area of the windows 7 screen, consisting of program icons, a task bar, and start button.
Right to privacy
To be left alone to do as one pleases provided that no laws are violated and no harm is done to others is the ___________.
Maximize
To increase the size of a window to fill the screen
Stakeholders
What are customers, suppliers, investors, employees, financial leaders and society at large all examples of _____?
Office web apps
What are the online companions to word, excel, powerpoint, access, and onenote called?
Tangible and intangible
What are the two different types of personal property?
Graphical user interface
What computer interface shows documents as they will look in their final form and uses icons to represent programs?
Terms of use
What documentation explains the parameters that govern your use of copyrighted materials that you download?
Number value
What is a constant value consisting of only numbers called?
Societal ethics
What is a general set of unwritten guidelines for people to follow called?
Dot leader
What is a series of dots following a tab that serves to guide the reader's eye?
Personal ethics
What is a set of formal or informal ethical principles that you use to make decisions on your own life called?
Shortcut menu
What is activated by pointing at objects and right clicking the right mouse button?
Flaming
What is expressing an opinion with strong emotion online, such as typing in all capital letters called?
Justified alignment
What is the alignment of text in which text is aligned to the left margin unevenly called ______?
All programs
What is the command at the bottom of the start menu that takes you to all available programs on your computer ?
Formula bar
What is the element in the excel window that displays the value or formula contained in the active cell called?
Cyberethics
What is the ethnical code followed when using computers and internet called?
Gallery
What is the office feature displays a list of potential results instead of just the command name?
Ribbon
What is the user interface in Office 2013 & Windows 8 that groups the commands for performing related tasks on tabs across the upper portion of the program window?
Power hung
What kind of cyber bully tries to show off how much smarter he or she is than their victim?
File
What kind of work would you save and store on a drive?
Live preview
What shows the result of applying the editing or formatting changes as you point to possible results before you actually apply it?
Workbook
When starting excel it will display a new blank _____.
Deselect
When you cancel the selection of an object or text box by clicking outside of the selection you _____ the object or text.
Edit mode.
When you create a new folder, the folder name displays in ______?
Favorites
When you create a search folder, it displays in the navigation pane under the ____ category?
Layout options
Which button displays when an object is selected that has commands that will decide how the object interacts with surrounding text?
Public domain
Works without copyright protection are considered to be ________.
Minimize
You ______ the window to remove the window from the screen without closing it.
Style
____ is the group of formatting commands, such as font, size, color, paragraph alignment, and line spacing that can be applied to a paragraph with one command.
Intangible
____ property, is property that cannot be touched or potentially even seen.
Contextual tabs
_____ are added to the ribbon automatically when a specified object, such as a picture, is selected and contains commands relevant to the selected object.
Morals
_____ involve conforming to established or accepted ideas of right and wrong.
Stalking
_____ is when an individual threatens or annoys another individual in cyberspace.
Pointing
______ is the action of moving your pointer over something on your screen.
Password theft
______ is when one individual obtains another person's password and uses it to obtain information or harass the victim.
Smart art
_______ is designer-quality graphics used to create visual representation of information.
Nonprinting
________ characters hold the place for other text and is not seen.
Windows Aero
_________ is the Windows 7 user interface that features a 3D look with transparent window frames, live previews of open windows, and multiple color schemes.