BCIS 2610 Exam 3 study guide
wearable
. Google Glasses are an example of a technology called ______..
gradient
A ______ is shading in which one color blends into another or varies from one shade to another a. gradient b. glow c. reflection d. bevel
first
A ___________ item is a main item in a list a. base-level b. root c. sub d. first-level
b
A ____________ is a security system that essentially creates a wall between a computer or network and the internet in order to protect against unauthorized access. a. trojan horse b. firewall c. hub d. bridge
theme
A _____________ is a coordinated set of colors, fonts, backgrounds, and effects a. theme b. layout c. template d. thumbnail
a
A ______________ usually projects the image from a mobile device to display screen built into the glasses via a wireless connection a. wearable display b. integrated projector c. pico projector d. 3d printer
pico
A ____is a pocket-sized device that typically connects to a smartphone or portable computer to enable the device to display an image on a wall.
title
A commonly used layout is the ________ layout a. blank b. section header c. title and content d. picture with caption
family
A theme and its variants are called a theme _____________ a. set b. group c. family d. template
optical
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
c
A(n) _________ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operation going. a. buddy site b. alternate pad c. hot site d. white room
template
A(n) _________, like any presentation, has a them applied, but it also contains text, graphics, and placeholders to help direct you in creating content for a presentation. a. format b. template c. outline d. placeholder
preview
After working for a while, Merlia wants to see how the transitions look. John shows her that there is a ____ button on the TRANSITIONS tab to preview transitions.
playback
After you insert a video, you can modify it by changing _________ options. changing the length of time the video plays, and applying formats and styles to the video a. playlong b. playback c. playnow d. playforward
design
An installed theme can be applied by clicking on a theme in the Themes group on the ____ tab.
advance
Click the "return to the previous slide" and " _________ to the next slide" buttons to move from slide to slide in slide show view a. move b. search c. advance d. progress
slide number
Clicking either the Date & Time button or the ____ button opens the Header & Footer dialog box.
external
Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images.
b
Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____________ light to display images a. internal b. external c. diffuse d. both a and b
yellow
Draw the ____ adjustment handle on a shape to change its proportions without changing the size of the shape.
B
During your presentation, you can easily display a blank black slide by pressing the _____ key(s) a. B b. F3 c. F6 d. Alt+B
presentation
Ethan has not saved his PowerPoint file yet, and it appears with a temporary filename "____" followed by a number.
trim
If a video is too long, or if there are parts you don't want to show during the slide show, you can ______ it. a. clip b. cut c. crop d. trim
96
If photos need to be emailed or uploaded to a web page, choose the __________ ppi compression setting a. 50 b. 96 c. 150 d. 220
one at a time
If you animate a list, the default is for the first-level items to appear_______ a. one at a time b. two at a time c. all at one time d. one word at a time
office
If you don't choose a theme, the default _____ theme is applied a. blank b. office c. corporate d. primary colors
open
If you have closed a saved presentation, open it in backstage view by using the _____ command. a. open b. save c. edit d. search
office
If you need to use a custom theme frequently, you can save a presentation file as a(n) ____ Theme file.
poster
If you see a black square when you insert a video, you can override this by setting a ______ frame a. placement b. pop-up c. poster d. placeholder
Footer
In common usage, a(n) ____ is any text that appears at the bottom of every page in a document or every slide in a presentation.
cropping
In power point terms, _____ a photo means cutting out the parts you don't want to include a. snipping b. cropping c. trimming d. dashing
title
Ivan tells Kamilla that the first slide of her presentation will be the ____ slide.
Apply to All
John tells Merlia that it is often best to use the same slide transition consistently. He shows her the ____ button which applies the transition to all the slides in the presentation.
onedrive
Kamilla has run out of room on her computer's hard drive, so Ivan helps her upload the file to her account on ____, Microsoft's free online storage area.
gallery
Kyle easily adds new shapes to a timeline. He simply clicks the shape he needs in the Shapes ____.
Effects
Kyle wants to add a 3D rotation to highlight one of the mountain ranges. To do this he clicks the Shape ____ button.
Weight
Kyle wants to change the thickness of one of the shape outlines. Thickness is another word for ____.
flip
Like shapes, you can rotate or ____ pictures using the Rotate handle or the Rotate button.
effect options
Merlia wants all of her slides to come "From Right" except the last slide. She can change the last slide to come "From Top" by clicking the ____ button
slide pane
Normal view displays slides on at a time in the __________. a. slide pane b. view pane c. slide view d. slide window
text
Once Kamilla decides to work with the Title slide she sees that it has two ____.
bluetooth wireless usb
One of the key enhancements in the newest Bluetooth specification known as _____________ is low energy, which enables small devices to run for years on a single button-sized battery.
timing
Sequence options appear on the effect options menu in addition to the _________ options when an animation is applied to a text box. a. rotation b. direction c. size d. timing
points
Text is measured in __________ a. points b. pixels c. inches d. millimeters
home
The Add or Remove Columns button in the Paragraph group on the ____ tab allows you to create multiple columns in a text box.
tools
The DRAWING ____ FORMAT tab appears when a drawing or a text box—including the slide's title and content placeholders—is selected.
optimize
The Info screen in Backstage view contains a(n) ____ Media button as well as the Compress Media button.
title
The ___________ is the first slide in a power point presentation a. presentation outline slide b. title slide c. content slide d. default slide
aspect
The ___________ ratio is the ratio of a object's height to its width a. image b. pixel c. aspect d. proportion
animation
The media _____ category appears only when a media object-- either video or audio -- is selected on a slide a. cartoon b. animation c. transition d. movement
4
The most commonly used video formats are the MPEG- _____________ format, the windows media audio/video format, and the audio visual interleave format a. 1 b. 2 c. 3 d. 4
near
The new ApplyPay service uses which technology?
tab
The start timing setting is on the VIDEO TOOLS PLAYBACK ______________ a. slider b. tab c. button d. group
2
There are _____ text placeholders on the title slide a. 2 b. 3 c. 4 d. 5
Style
To add visual interest, Kyle changes the ____ of the shape's border by changing the solid outline to a dashed line.
gallery
To apply a theme from a presentation stored on your computer or network, click the _______ button, and then click Browse for Themes a. Themes Plus b. Themes more c. Themes Now d. Themes gallery
duration
To change the speed of a transition, John shows Merlia how to change the ____.
media
To compress the videos in a presentation, click the compress _____ button a. videos b. media c. audio d. files
insert
To draw a shape, click the Shapes button in the Illustrations group on the _____ tab, click a shape in the gallery, and then click and drag to draw the shape in the size you want
sorter
To duplicate, rearrange, or delete slides, you select the slides in the slides tab in _______ view or switch to slide sorter view a. normal b. reading c. slide show d. slide sorter
save as
To edit a presentation without changing the original, create a copy of it. To do this, use the ______ command. a. save b. save as c. copy d. copy as
recent
To find a template on Office.com, display the ________ or new screen in backstage view a. old b. recent c. custom d. search
arrange
To flip and object, you sue the flip commands to rotate button menu in the ____________ group on the DRAWING TOOLS FORMAT tab. a. reset b. finish c. position d. arrange
red
To indicate that a word might be misspelled, a _____ squiggly line appears under it a. red b. blue c. green d. yellow
slides
To insert a new slide, you use the new slide button in the _________ group on the home tab a. clipboard b. slides c. paragraph d. drawing
gallery
To insert a shape, click a shape in the Shapes ____.
tables
To insert a table, in a content placeholder, click the INSERT tab on the ribbon, click the table button in the group, and then click insert table a. data b. tables c. charts d. boxes
from
To insert video stored on you computer or network, click the insert video button in a content placeholder, and then in the insert video window next to "_____," click browse to open the insert video dialog box a. to a file b. from a file c. export a file d. save a file
rotate
To open a menu of Rotate and Flip commands, Kyle clicks the ____ button.
reference
To record data, holographic storage systems split the light from a blue laser beam into two beams-a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.
b
Today's holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, its current capacities ranging from 300 GB to __________ GB per cartridge. a. 400 b. 500 c. 600 d. 700
500
Today's holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, with current capacities ranging from 300 GB to ____ GB per cartridge.
Silicon
Typically, 3D chips are created by layering individual ___ wafers o top of one another with a special machine that uses cameras to align the wafers properly
reset
Use the ____ Picture button to undo formatting and sizing changes you made to a picture.
a
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) _______________. a. ups b. surge suppressor c. voltage controller d. voltage meter
normal
When Ethan first creates a new presentation it is displayed in ____ view.
backstage
When Ethan first opens PowerPoint, he has two ____ view options: 1) to open an existing presentation or 2) to create a new file.
Drawing Tools
When Kamilla clicks in the Title placeholder a contextual tab, the ____ tab, appears on the ribbon.
blinking
When Kamilla clicks in the Title placeholder, the insertion point appears as a ____ line in the center of the placeholder.
normal
When Power Point starts, it displays a blank presentation in _________ view. a. default b. normal c. blank d. slide
upper-right
When you are finished working with a presentation, you can exit power point. If there is only one presentation open, you click the close button in the _____ corner of the program window to exit the program. a. upper-left b. upper-right c. lower-left d. lower-right
low
When you choose the __ compression level for videos the file will be compressed as small as possible a. low quality b. poor quality c. blur d. space saver
internet
When you choose the ____ compression level for videos the file will be compressed to a quality suitable for streaming over the internet a. presentation quality b. internet quality c. network quality d. ISP quality
presentation
When you choose the _______ compression level for video the file will be compressed slightly and will maintain the quality of the videos a. presentation quality b. internet quality c. television quality d. digital quality
document
When you choose the _______ compression setting, photos are compressed to the resolution specified on the advanced tab in the power point options dialog box a. no compression b. yes compression c. document resolution d. compression resolution
handouts
When you print ___________, the presentation is printed with one or more slides on each piece of paper a. full page slides b. notes pages c. outline d. handouts
draw
When you use the Borders button arrow, the borders will be the style, weight, and color specified by the Pen Style, Pen Weight, and Pen Color buttons in the ____ Borders group.
opto
While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ computer, may be the best bet for the future.
spatial
With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM), which translates the data's 0s and 1s into a hologram
insert
You can use the picture button in the images group on the _______ tab to add photos to slides a. VIEW b. INSERT c. DESIGN d. HOME
PRAM
____ chips have a special coating that changes its physical state when heat is applied.
TLED
____ displays are transparent; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen
d
____ systems encrypt everything stored on the drive automatically without any user interaction a. usb b. rfid c. idc d. fde
b
______ can be extremely distressing for victims, can take years to straighten out, and can be very expensive. a. spams b. identity theft c. remote access d. software theft
sizing
______ handles are the small squares that appear in the corners and in the middle of the sides of the border of a selected object a. zoom b. sizing c. object d. magnification
b
______ programs can be used to detect and remove some types of illegal computer monitoring and spyware software. a. antivirus software b. antitpyware software c. antispoof software d. antiphish software
b
_______ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics. a. deep technology b. artificial intelligence c. expert d. environmental
b
_______ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle. a. malleable b. rugged c. semirugged d. flexible
b
_______ is a generic term that refers to any type fo malicious software a. spamware b. malware c. spyware d. badware
d
________ cameras are increasingly being installed in schools in the U.S. and other countries to enable administrators to monitor both teacher and student activities. a. computer monitoring b. computer surveillance c. multimedia surveillance d. video surveillance
d
________ chips have a special coating that changes its physical state when heat is applied a. ram b. pam c. rpam d. pram
d
________ identity users by a particular unique biological characteristic. a. possessed object access systems b. password access systems c. possessed knowledge access systems d. bio-metric access systems
c
________ includes any acts of malicious destruction to a computer or computer resource a. phishing attacks b. blocking attacks c. computer sabotage d. spoofing attacks
b
________ is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lost functionality to or facilitate the communications of severely disabled individuals a. telebrainange b. BCI c. verichip'ing d. CIT
c
________ refers to companies recording or observing the actions of employees while on the job. a. computer monitoring b. video surveillance c. employee monitoring d. identity theft
a
________ software can control which devices can be connected to an employee's computer. a. data-leakage prevention b. device authentication c. professional firewall d. network quarantine
d
_________ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object a. surge suppressors b. password locks c. spike suppressors d. cable locks
b
_________ devices are designed to withstand much more physical abuse than conventional devices a. secured b. ruggedized c. pillows d. cushions
c
_________ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities. a. framing b. fishing c. pharming d. farming
b
_________ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty. a. NSF b. DARPA c. NASA d. the W3C
d
_________ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. a. computer monitoring b. computer surveillance c. multimedia surveillance d. video surveillance
c
_________ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity a. surveillance software b. video software c. computer monitoring software d. audio software
a
_________ mobile payments use raid to facilitate communication between devices, including transferring payment information, receipts, boarding passes, and other information wirelessly between payment terminals and mobile phones. a. wireless batch communication (WBC) b. RF product communication (RFPC) c. near field communication (NFC) d. electronic product coding (EPC)
speaker
__________ notes are information you add about slide content to help you remember to bring up specific points during the presentation a. speaker b. audience c. Reminder d. handout
b
___________ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service. a. government database b. marketing database c. educational database d. research dateabase
fit
_______________ adjusts default font sizes and line spacing to make the text fit a. auto fit b. auto room c. Auto Adjust d. Auto squeeze
c
_______________ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities--usually to buy products or services in that person's name. a. data theft b. information theft c. identity theft d. database theft
reading
_______________ view displays the slides so that they almost fill the screen, and a status bar appears identifying the number of the current slide and providing buttons to advance the slide show a. reading b. slide show c. handouts d. presenter
a
________________ refers to the ability of one computing device on a network to identify another device on the same network and determine its status a. presence technology b. computer monitoring c. digital surveillance d. detection technology
a
__________________ uses a single secret key to both encrypt and decrypt the file or message a. private key encryption b. asymmetric key encryption c. public key encryption d. synchronous key encryption
a
a _______ is a malicious program that masquerades as something useless--usually as some type of application program. a. trojan horse b. computer worm c. computer insect d. computer bug
a
a _________ is a pocket-sized device that typically connects to a smartphone or portable computer to enable the device to display an image on a wall a. pico projecto b. mega projecto c. 3d projector d. hologram projector
d
a ___________ provides a secure private tunnel from the user's computer through the internet to another destination and is most often used to provide remote employees with secure access to a company network a. laptop private network b. usb private network c. tunnel private network d. virtual private network
d
a booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____________. a. e-cons b. e-scams c. dot frauds d. dot cons
c
a computer ______ spreads by creating copies of its code and sending those copies to other computers via a network a. virus b. software c. worm d. hacker
b
a computer _______ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to. a. phish b. virus c. bot d. link
d
a computer that is controlled by a hacker or other computer criminal is referred to as a ___________. a. spider b. server c. client d. bot
a
a(n) _________ network, is designed to emulate the brain's pattern-recognition process in order to recognize patterns in data and make more progressive leaps in associations a predictions than conventional computer systems. a. neural b. programming c. code d. inference
a
a(n) __________ computer uses light, such as rom laser beams or infrared beams, to perform digital computations a. optical b. digital c. hybrid d. solar
d
although many of us may prefer not to think about it, __________________--the complete malfunction of a computer system--and other types of computer related disasters do happen. a. software piracy b. interrupted power c. spikes d. system failure
b
an emerging military robotic application is the _________ suit, which is a wearable robotic system designed to give an individual additional physical capabilities and protection a. exohuman b. exoskeleton c. exophsical d. exobody
a
antivirus programs are usually set up to automatically download new _____ from their associated web site on a regular basis. a. threat definitions b. viruses c. fraud tips d. virus reports
b
by ____, you instruct companies you do business with that they cannot share your personal data with third parties a. signing piracy agreements b. opting out c. contracting legal help d. e-mailing them
d
collecting in-depth information about an individual is know as _____________. a. personal databasing b. identity theft c. information piracy d. electronic profiling
d
creating a ________ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy. a. mirror b. hotspot c. hot file d. backup
b
developed in the late 1990s, wi-fi is a family of wireless networking standards that use the IEEE standard ________. a. 802.1 b. 802.11 c. 801.2 d. 810.22
a
for monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of _________. a. proximity cards b. presence technology c. face recognition d. video cards
b
for online shopping ,signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ________. a. junkie e-mail address b. throw-away e-mail address c. one-use e-mail address d. second-hand e-mail address
c
in general, wi-fi is designed for data transfers between ________ feet indoors a. 10 and 100 b. 500 and 1,000 c. 100 and 300 d. 30 and 90
b
laptop ________________ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag a. pads b. sleeves c. pillows d. cushions
a
like a computer virus, a ____ is a malicious program designed to cause damage. a. computer worm b. scam c. phish d. computer bug
d
most businesses and web sites that collect personal information have a(n) ______ that discloses how the personal information you provide will be used. a. piracy policy b. security policy c. identity policy d. privacy policy
b
most people agree that nanotechnology involves creating computer components, machines, and other structure that are less than _________ nanometers in size. a. 10 b. 100 c. 1,000 d. 10,000
a
one common way to deal with spam that makes it to your computer is to use a(n) _________. a. e-mail filter b. spam e-mail address c. encryption scheme d. hot site
b
one emerging type of trojan horse called a________________-access trojan. a. demote b. remote c. control d. hacker
b
one example of a neural network is a(n) ___________ system that uses cameras to inspect objects and make determinations-for example, the systems that check products for defects at manufacturing plants a. telemetry b. vision c. indexing d. robotic
a
one new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is _________ videoconferencing a. telepresence b. television c. telephoning d. televirtual
c
one of the key enhancements in the newest bluetooth specification know as _______ is low energy, which enables small devices to run for years on a single button-sized battery. a. bluetooth le b. bluetooth smart c. bluetooth wireless usb d. bluetooth gig
c
one recent development in new technology is _____ that can remove contaminants from water sources a. magnetized particles b. microparticles c. nanofilters d. electroparticles
a
phishing schemes may use a technique called _______, which is setting up spoofed web sites with addresses slightly different from legitimate sites. a. typosquatting b. spamming c. dos attacks d. identity theft
b
power over ethernet (PoE) allows both _______ power and data to be sent over standard ethernet cables. a. microwave b. electrical c. magnetized d. radio wave
a
repeated threats or other harassment carried out online between adults is referred to as _________. a. cyberstalking b. computer sabotage c. cyberterrorism d. phishing
b
self-driving cars, like google's autonomous cars, are essentially _____________. a. neural networks b. robotic cars c. expert systems d. inference engines
b
some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ___________. a. recycle b. recovery c. repair d. running
c
some web-based encrypted e-mail systems --such as the popular free _______ service--require both the sender and recipient to have accounts through that system a. cryptmail b. quietmail c. hushmail d. privatemail
a
telesurgery is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient, and which typically uses _______ to give the human surgeon an extremely close view of the surgical area. a. cameras b. microscopes c. bright lights d. magnifying glasses
b
the ______ web is predicted evolution of the current web in which all web content is stored in formats that are more easily read by software applications and intelligent agents. a. 5G b. semantic c. natural-language d. through-stream
c
the _________ includes provisions to combat cyberterrorism, including protecting isps against lawsuits from customers for revealing private information to law enforcement agencies. a. heath insurance portability and accountability act (HIPPA) b. PROTECT Act c. Homeland security act of 2002 d. national information infrastructure protection act
b
the __________, implemented in 2001, grants federal authorities expanded surveillance and intelligence gathering powers, such as broadening their ability to obtain the real identity of internet users and to intercept internet communications. a. sarbanes-oxley act b. USA patriot act c. identity theft and assumption deterrence act of 1998 d. no electronic theft (NET) act
d
the best protection against many dot cons is________. a. contacting your isp b. updating the operating system c. installing an antivirus program d. common sense
a
the term_____ refers to the rights of individuals and companies to control how information about them is collected and used. a. information privacy b. information security c. information piracy d. digital counterfeiting
c
the wall of a single-waled carbon nanotube is only one carbon atom which and the tube diameter is approximately _____ times smaller than a human hair a. 10 b. 1,000 c. 10,000 d. 100,000
b
to ___________ means to request that you be included in marketing activities or that your information be shared with other companies. a. filter b. opt in c. opt out d. share accept
a
to facilitate using a computer lock, nearly all computers today come with a _____________--a small opening built into the system unit case designed for computer locks a. security slot b. cable anchor c. security opening d. user lock
a
to prevent counterfeiting of U.S. currency, the treasury department releases new currency designs every ___________. a. 7 to 10 years b. 10 years c. 10 to 12 years d. 12 years
a
to record tâta, holographic storage systems split the light from a blue laser beam into two beams--a _____________ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data. a. reference b. static c. standard d. starting
c
to supplement backup procedure, businesses and other organizations should have a(n) ___________. a. insurance plan b. continuation rule c. disaster recovery plan d. survival guide
b
typically, 3d chips are created by layering individual _______ wafers on top of one another with a special machine that uses cameras to align the wafers properly. a. circuit boards b. silicon c. aluminum d. magnetic
painter
use the animation ______ to copy the animation, effects, and duration applied to one object to another object a. wizard b. copy cat c. vault d. painter
title slide
usually the date and slide number do not need to appear on the ______ a. title slide b. definition slide c. title of contents slide d. summary slide
a
when a digitally signed document is received, the recipient's computer uses the sender's ________ key to verify the digital signature. a. private b. public c. organizational d. token
c
when spam is sent via IM it is called _______. a. spoof b. phish c. spim d. junk
c
when using a(n) _______ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users. a. decision b. knowledge c. expert d. analysis
220
when you save a presentation that contains photos, power point automatically compresses the photos to a resolution of ________ pixels per inch (ppi) a. 120 b. 180 c. 220 d. 280
c
while some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an _________ computer, may be the best bet for the future a. electro-optics b. electronic-opto c. opto-electronic d. optics-electro
c
with holographic storage systems, the signal beam passes through a device called a ______ light modulator (SLM), which translates the data's 0s and 1s into a hologram a. starting b. standard c. spatial d. static