IBT - Review for Final Exam - FALL
In word processing, when creating a table of contents, what would you use?
dot leader, right tab
What zoom percentage shows the document at its normal size?
100%
How many selections can you save on MS Word's clipboard?
24 items saved.
Where can you create a hyperlink in a document?
email address, existing file or web page, and a place in the document.
What is a school based enterprise?
A School-Based Enterprise (SBE) is a set of entrepreneurial activities undertaken by students that provides an economic, social and educational return to the student, school and community.
insertion point
A blinking line that shows where text will appear when you begin typing
a trademark provides legal protection for?
A business's name or symbol
Fair Use
A concept in copyright law that allows limited use of copyright material without requiring permission from the rights holders.
What is a patent?
A form of intellectual property, that protects the creation of a device or process.
Creative Commons
A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit. You must follow certain rules.
Header
A line, or lines, of content in the top margin area of a page in a document, that typically contain elements such as the title, page number, or name of the author.
Trojan Horse
A type of malware that appears to be desirable thus tricking the user into allowing the program access to their computer.
What are some examples of text formatting?
Adding bold, italics, underlining words etc. to emphasize them.
Fair Use
Allows limited use of copyrighted works.
Go to
Allows you to jump to a specific part of a document.
Hoax
An email letter that warns of impending viruses and tries to scare users into forwarding it
What is intellectual property?
Any original content you create and record in a lasting form.
Distraction
Anything that interferes with the sender's creating and delivering a message and the receiver's getting and interpreting a message.
What can identity thieves do?
Apply for a job, get a drivers license, apply for more credit
Why do you use word processing software?
Because you can easily create, edit, and publish business documents like letters and reports.
What is the first step you take if you believe you are a victim of identity theft?
File a police report.
In a table to move forward or backward in a cell what keys do you press?
Forward - tab, backward - shift/tab
Why should you cite your sources?
Gives credit to original author and shows you are not taking credit for someone's work.
What allows you to jump to a specific part of a document?
Go to
Output device for computer
Hardware that conveys information to one or more people, ex: printer, Monitor, speaker
Input device for computer
Hardware used to enter data and instructions for a computer, ex. keyboard, microphone, mouse
What is not protected by copyright?
Ideas, facts, methods, procedures
When would you use crop in a document?
If you do not want part of a graphic to appear in the document, you would crop the part you do not want.
Information Processing Cycle
Input, processing, storage, output
Which tab do you use to insert a symbol?
Insert
How do you insert date into a document?
Insert tab > text group > date and time
What is a reference?
People who know an applicant well and can provide information about that person.
Parody
Poetry, a play or a song which imitates someone in order to make fun
spam
Political emails that are delivered to many inboxes at one time.
To be effective, goals must be?
SMART - specific, measurable, attainable, realistic & timely
What are some ways that an identity thief can steal someone's credit card information and other pieces of personal information?
Shoulder surfing at ATM machines, dumpster diving in trash bins, stealing mail from mailboxes, etc.
Which command allows you to see the hidden formatting marks or paragraph marks?
Show/hide button
Malware
Software code (such as a virus) designed to secretly invade a computer system and perform some unauthorized or destructive action.
If you are changing the format of a single paragraph in MS Word, where must the insertion point be located?
Somewhere in the paragraph
Piracy
Stealing copyrighted work by downloading or copying it
Credit card
The card you should use when purchasing online so your identity will not be stolen.
What is a screen tip?
The colors in the palettes all have names, by hoovering your mouse over the colors the screen tip name is given.
Copyright
The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.
How long is copy written work protected?
The life of the author plus an additional 70 years.
What is the channel of communication?
The means by which a message is conveyed.
paraphrasing
The process of putting the ideas of another author into your own words without changing the original meaning.
Dialogue box launcher
The small arrow in the lower-right corner of a group, points to more detailed or advanced options available for the commands in the group.
Copyright Infringement
The unauthorized use of copyrighted material in a manner that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works that build upon it.
What is the purpose of an endnote?
To acknowledge the source of the information and provide explanatory comments that would interrupt the flow of the main text
In MS Word, to be a multilevel list, how many levels of bullets or numbering must it have?
Two or more
The repeat command replaces what action?
Undo
How can you guard against malware on your computer?
Use antivirus software
Professionalism
Values or standards which direct the way individuals interact with other
examples of malware
Viruses, worms, Trojan horses
What is the line thickness, or thickness of shape outlines in your drawings or textboxes called?
Weight
Cut
What it is called when selected text is removed from the document and placed on the clipboard
vishing (voice phishing)
When someone contacts you on the phone impersonating a bank asking you to verify your account information.
56. When creating passwords and PIN numbers what information should you avoid using that an identity thief can use?
Your birthdate, last four digits of your soc security #, your middle name, etc.
What should you not carry in your wallet - to minimize the amount of info an identity thief can steal?
Birth certificate, passport, social security card
Plagiarism
Copying things and claiming published work as your own work, without giving the author / owner credit
What are the ideal privacy settings to have on your social networking site?
Custom
print preview
Enables you to look at a document as it will appear when printed.
Credit reporting agencies
Equifax, Transunion and Experian.
The find and replace editing commands are found where?
Home tab > editing group
In Word, what does adding a Theme do to a document?
It changes the color scheme, font and formatting at one time.
if a website begins with HTTPS
It is safer than other websites
When would you use a numbered list in MS Word?
It is useful when items appear sequentially such as instructions
How do you change the margin settings?
Layout tab > page setup group > margins dropdown
What are the Text alignment settings?
Left, right, center, decimal, bar
Most documents are printed in what orientation?
Portrait
Formatting Marks
Special symbols, representing spaces, tabs, and paragraphs, that do not appear on paper when a document is printed.
In a table to add a new row to the table you should place the insertion point in the last cell (lower right corner) and press what key?
Tab
In Ms Word, what is an arrangement of text or numbers in rows & columns, similar to a spreadsheet?
Table
identity theft
a crime that occurs when a person steals your personal information and uses for self-gain
If you have to schedule a business meeting with a group of people what should you use?
a meeting scheduler in email
Phishing
a scam that tries to trick you into giving out your SSN and other personal information
Trademark
a symbol, word or words legally registered or established as representing a company or product.
How do you know if a website is credible?
a. The author of the website is considered an expert b. Date of website, research c. Sources are cited d. Domain - .edu & .gov - usually safe e. Writing style - poor grammar f. Site design
show/hide command
allows you to see the hidden formatting marks. (home<paragraph<show/hide)
What is text formatting?
bold, italics, or underlining words to emphasize them
What happens when you push the shortcut word - Home?
cursor goes to the beginning of the line.
What are the most effective Communication skills?
reading, writing, speaking, and listening
repeat command
repeats the most recent action
How do you maintain adaptability in the workplace?
stay calm and develop a solution
What is a cover letter?
supplements resume, highlights key points in resume, expresses interest in a position, shows qualifications to a potential employer and requests and interview.
Cut selected text
t is removed from the document and placed on the clipboard.
Distortion
when people consciously or unconsciously change messages