CSCI 190 Part 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Toggle

A button that can be turned on by clicking it once and turned off by clicking it again is called a ____.

Embedded Code

A code that creates a link to a video, picture, or other type of rich media content is called a _____.

Keyboard shortcut

A combination of two or more keyboard keys used to perform a task that would otherwise require a mouse is a _____.

Gadget

A dynamic program, such as a clock, a stock market ticket, or a weather window that displays on the desktop is called a ________.

Bulleted list

A list of items which has each item introduced by a symbol is a ___________.

Tab stop

A mark on the ruler that indicates the location where the insertion point will be placed when you hit tab is called the ____.

Template

A pre formatted document that you can use as a starting point and then change to suit your needs is a _____.

Snipping tool

A program that captures a screen or part of a screen

Windows explorer

A program that enables you to create and manage folders and copy, move, sort, and delete files.

Footer

A reserved area for test of graphics that displays at the bottom of each page in a document

Operating system

A set of instructions that coordinates the activities of your computer called the _______.

Paint

A simple drawing program incorporated with windows 7 is...

Mini toolbar

A small toolbar containing frequently used formatting commands that displays as a result of selecting texts or objects.

Information tab

A tab in backstage view that displays information about the current file is the _____.

Object

A text box, picture, table, or shape that you can select and then move and resize is called an _____.

Harassing

An individual that threatens another individual via electronic communications is ________ the victim.

Command

An instruction to a computer program that causes an action to be carried out

Cell address

Another name for a absolute cell reference is the ______.

No

Are chemical patents real? Yes/No

Unethical

Behaving in a manner that does not conform to a set of approved behavioral standards is ______?

Interactive media

Computer interaction that responds to your actions is called _____.

Rich Media

Computer interactions that respond to your actions such as text, graphics, animation, video, audio, and games are called ____.

Book or periodical

Contact the author of publisher if you are seeking permission to use either a _______or______.

Metadata

Custom file properties, such as names, places and descriptions that are added to files are called _____?

No

Does the amount you are willing to pay if the permission is granted to use copyrighted materials need to be included in the request? Yes/No

Font styles

Formatting emphasis such as bold, italic, and underline are _______.

Author's life plus seven years

How long does the copyright of an original work granted for?

Confidential

If you are in possession of information about an individual and don't know if that person would want that information disclosed then you should keep the information ________?

Quick access toolbar

In an office program window, the small row of buttons in the upper left hand corner of the screen from which you can perform frequently use commands is the ____.

Navigation

In the windows explorer window, the pane that displays favorites, libraries, computer and network information is called the _____ pane?

Industrial espionage

In the workplace, spying on your competitors to gain access to sensitive information is called _____?

No

Is "Thou shall not use anonymity" one of the commandments of computer ethics? Yes?No

No

Is car jacking a white collar crime? Yes/No

Yes

Is deleting a bad video of someone else upholding and demonstrating ethical behavior? Yes/No

Netiquette

Most schools and businesses adopt _____ to establish guidelines for computer usage.

4th

Our forefathers did not directly address the right of individual privacy to us; however the _____ amendment to the constitution does refer to the right of people to be secure.

Illegal

Parking your car in a handicap spot with a handicap permit that belongs to your grandma is _____?

Unethical

Posting a picture on facebook and tagging your friend without his or her permission is _____?

Western

Privacy or secrecy is viewed as an inalienable right in the _____ culture?

Real and personal

Property comes in what two general types?

Keystone loggers

Software programs that record every keystroke that you make on your computer are called _____.

Bullets

Text symbols such as small circles or check marks that introduce items in a list are called _____.

Illegal

Texting while driving is _____ in most states.

File extension

The 3 or 4 characters to the right of the period in a file name is called the ______?

Details pane

The ______ displays information about the drive, folder, or filed selected in the content pane.

Placeholder text

The _________ is non-printing text that holds a place in a document where you can type.

Dragging

The action of holding down the left mouse button while moving your mouse is called ____?

Notification area

The area on the right side of the task bar that keeps us informed about processes that are occurring in the background is the ____?

Pointer

The arrow, I-beam or other symbol that shows the location or position of the mouse on your screen is the _______.

Horizontal scroll bar

The bar at the bottom of the window that enables you to move left and right

Vertical scroll bar

The bar on the right side of a window that enables you to move up and down to view information that extends beyond the top and bottom of the screen is the __________.

Line spacing

The distance between the lines of a text in a paragraph is called the ____.

Name box

The element in the excel window that displays the name of the selected cell, table, chart, or object is called the _____.

Chart

The graphic representation of data in a worksheet is called a _____.

1st sale doctrine

The legal principle that allows public libraries to lend out copyrighted materials is the ______.

Texting

The only exception to communication monitoring of an employee by an employer is ______.

Fill handle

The small black square in the lower right corner of a selected cell is the_____.

Cyber bullying

The use of digital technology to harass, threaten, humiliate, or torment another individual is called ______.

Trade dress

The visual appearance of a product or its packaging is the _________.

Trademark

The word "intel" in blue surrounded by a blue circle is an example of a ________.

Desktop

The working area of the windows 7 screen, consisting of program icons, a task bar, and start button.

Right to privacy

To be left alone to do as one pleases provided that no laws are violated and no harm is done to others is the ___________.

Maximize

To increase the size of a window to fill the screen

Stakeholders

What are customers, suppliers, investors, employees, financial leaders and society at large all examples of _____?

Office web apps

What are the online companions to word, excel, powerpoint, access, and onenote called?

Tangible and intangible

What are the two different types of personal property?

Graphical user interface

What computer interface shows documents as they will look in their final form and uses icons to represent programs?

Terms of use

What documentation explains the parameters that govern your use of copyrighted materials that you download?

Number value

What is a constant value consisting of only numbers called?

Societal ethics

What is a general set of unwritten guidelines for people to follow called?

Dot leader

What is a series of dots following a tab that serves to guide the reader's eye?

Personal ethics

What is a set of formal or informal ethical principles that you use to make decisions on your own life called?

Shortcut menu

What is activated by pointing at objects and right clicking the right mouse button?

Flaming

What is expressing an opinion with strong emotion online, such as typing in all capital letters called?

Justified alignment

What is the alignment of text in which text is aligned to the left margin unevenly called ______?

All programs

What is the command at the bottom of the start menu that takes you to all available programs on your computer ?

Formula bar

What is the element in the excel window that displays the value or formula contained in the active cell called?

Cyberethics

What is the ethnical code followed when using computers and internet called?

Gallery

What is the office feature displays a list of potential results instead of just the command name?

Ribbon

What is the user interface in Office 2013 & Windows 8 that groups the commands for performing related tasks on tabs across the upper portion of the program window?

Power hung

What kind of cyber bully tries to show off how much smarter he or she is than their victim?

File

What kind of work would you save and store on a drive?

Live preview

What shows the result of applying the editing or formatting changes as you point to possible results before you actually apply it?

Workbook

When starting excel it will display a new blank _____.

Deselect

When you cancel the selection of an object or text box by clicking outside of the selection you _____ the object or text.

Edit mode.

When you create a new folder, the folder name displays in ______?

Favorites

When you create a search folder, it displays in the navigation pane under the ____ category?

Layout options

Which button displays when an object is selected that has commands that will decide how the object interacts with surrounding text?

Public domain

Works without copyright protection are considered to be ________.

Minimize

You ______ the window to remove the window from the screen without closing it.

Style

____ is the group of formatting commands, such as font, size, color, paragraph alignment, and line spacing that can be applied to a paragraph with one command.

Intangible

____ property, is property that cannot be touched or potentially even seen.

Contextual tabs

_____ are added to the ribbon automatically when a specified object, such as a picture, is selected and contains commands relevant to the selected object.

Morals

_____ involve conforming to established or accepted ideas of right and wrong.

Stalking

_____ is when an individual threatens or annoys another individual in cyberspace.

Pointing

______ is the action of moving your pointer over something on your screen.

Password theft

______ is when one individual obtains another person's password and uses it to obtain information or harass the victim.

Smart art

_______ is designer-quality graphics used to create visual representation of information.

Nonprinting

________ characters hold the place for other text and is not seen.

Windows Aero

_________ is the Windows 7 user interface that features a 3D look with transparent window frames, live previews of open windows, and multiple color schemes.


Ensembles d'études connexes

Fractions to Decimals and Fractions to Percents, Decimals, Fractions, and Percents

View Set

Presidents of the USA Barack Obama 44th president

View Set

AP English Language and Composition

View Set

FINAL EXAM: ATI Safe Dosage, Nursing Conversions, ATI Medication Administration (Dosage Calculation), Drugs for Nurs 3110 Final, Dosages by Weights ATI, ATI Injectable Meds Test, ATI Oral Medications Test, Nurs 3110 M 11,109,8,7,6

View Set

Hematology Exam Simulator Questions

View Set

Chapter 12 Sliding Filament Theory #3

View Set