IBT - Review for Final Exam - FALL

Ace your homework & exams now with Quizwiz!

In word processing, when creating a table of contents, what would you use?

dot leader, right tab

What zoom percentage shows the document at its normal size?

100%

How many selections can you save on MS Word's clipboard?

24 items saved.

Where can you create a hyperlink in a document?

email address, existing file or web page, and a place in the document.

What is a school based enterprise?

A School-Based Enterprise (SBE) is a set of entrepreneurial activities undertaken by students that provides an economic, social and educational return to the student, school and community.

insertion point

A blinking line that shows where text will appear when you begin typing

a trademark provides legal protection for?

A business's name or symbol

Fair Use

A concept in copyright law that allows limited use of copyright material without requiring permission from the rights holders.

What is a patent?

A form of intellectual property, that protects the creation of a device or process.

Creative Commons

A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit. You must follow certain rules.

Header

A line, or lines, of content in the top margin area of a page in a document, that typically contain elements such as the title, page number, or name of the author.

Trojan Horse

A type of malware that appears to be desirable thus tricking the user into allowing the program access to their computer.

What are some examples of text formatting?

Adding bold, italics, underlining words etc. to emphasize them.

Fair Use

Allows limited use of copyrighted works.

Go to

Allows you to jump to a specific part of a document.

Hoax

An email letter that warns of impending viruses and tries to scare users into forwarding it

What is intellectual property?

Any original content you create and record in a lasting form.

Distraction

Anything that interferes with the sender's creating and delivering a message and the receiver's getting and interpreting a message.

What can identity thieves do?

Apply for a job, get a drivers license, apply for more credit

Why do you use word processing software?

Because you can easily create, edit, and publish business documents like letters and reports.

What is the first step you take if you believe you are a victim of identity theft?

File a police report.

In a table to move forward or backward in a cell what keys do you press?

Forward - tab, backward - shift/tab

Why should you cite your sources?

Gives credit to original author and shows you are not taking credit for someone's work.

What allows you to jump to a specific part of a document?

Go to

Output device for computer

Hardware that conveys information to one or more people, ex: printer, Monitor, speaker

Input device for computer

Hardware used to enter data and instructions for a computer, ex. keyboard, microphone, mouse

What is not protected by copyright?

Ideas, facts, methods, procedures

When would you use crop in a document?

If you do not want part of a graphic to appear in the document, you would crop the part you do not want.

Information Processing Cycle

Input, processing, storage, output

Which tab do you use to insert a symbol?

Insert

How do you insert date into a document?

Insert tab > text group > date and time

What is a reference?

People who know an applicant well and can provide information about that person.

Parody

Poetry, a play or a song which imitates someone in order to make fun

spam

Political emails that are delivered to many inboxes at one time.

To be effective, goals must be?

SMART - specific, measurable, attainable, realistic & timely

What are some ways that an identity thief can steal someone's credit card information and other pieces of personal information?

Shoulder surfing at ATM machines, dumpster diving in trash bins, stealing mail from mailboxes, etc.

Which command allows you to see the hidden formatting marks or paragraph marks?

Show/hide button

Malware

Software code (such as a virus) designed to secretly invade a computer system and perform some unauthorized or destructive action.

If you are changing the format of a single paragraph in MS Word, where must the insertion point be located?

Somewhere in the paragraph

Piracy

Stealing copyrighted work by downloading or copying it

Credit card

The card you should use when purchasing online so your identity will not be stolen.

What is a screen tip?

The colors in the palettes all have names, by hoovering your mouse over the colors the screen tip name is given.

Copyright

The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.

How long is copy written work protected?

The life of the author plus an additional 70 years.

What is the channel of communication?

The means by which a message is conveyed.

paraphrasing

The process of putting the ideas of another author into your own words without changing the original meaning.

Dialogue box launcher

The small arrow in the lower-right corner of a group, points to more detailed or advanced options available for the commands in the group.

Copyright Infringement

The unauthorized use of copyrighted material in a manner that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works that build upon it.

What is the purpose of an endnote?

To acknowledge the source of the information and provide explanatory comments that would interrupt the flow of the main text

In MS Word, to be a multilevel list, how many levels of bullets or numbering must it have?

Two or more

The repeat command replaces what action?

Undo

How can you guard against malware on your computer?

Use antivirus software

Professionalism

Values or standards which direct the way individuals interact with other

examples of malware

Viruses, worms, Trojan horses

What is the line thickness, or thickness of shape outlines in your drawings or textboxes called?

Weight

Cut

What it is called when selected text is removed from the document and placed on the clipboard

vishing (voice phishing)

When someone contacts you on the phone impersonating a bank asking you to verify your account information.

56. When creating passwords and PIN numbers what information should you avoid using that an identity thief can use?

Your birthdate, last four digits of your soc security #, your middle name, etc.

What should you not carry in your wallet - to minimize the amount of info an identity thief can steal?

Birth certificate, passport, social security card

Plagiarism

Copying things and claiming published work as your own work, without giving the author / owner credit

What are the ideal privacy settings to have on your social networking site?

Custom

print preview

Enables you to look at a document as it will appear when printed.

Credit reporting agencies

Equifax, Transunion and Experian.

The find and replace editing commands are found where?

Home tab > editing group

In Word, what does adding a Theme do to a document?

It changes the color scheme, font and formatting at one time.

if a website begins with HTTPS

It is safer than other websites

When would you use a numbered list in MS Word?

It is useful when items appear sequentially such as instructions

How do you change the margin settings?

Layout tab > page setup group > margins dropdown

What are the Text alignment settings?

Left, right, center, decimal, bar

Most documents are printed in what orientation?

Portrait

Formatting Marks

Special symbols, representing spaces, tabs, and paragraphs, that do not appear on paper when a document is printed.

In a table to add a new row to the table you should place the insertion point in the last cell (lower right corner) and press what key?

Tab

In Ms Word, what is an arrangement of text or numbers in rows & columns, similar to a spreadsheet?

Table

identity theft

a crime that occurs when a person steals your personal information and uses for self-gain

If you have to schedule a business meeting with a group of people what should you use?

a meeting scheduler in email

Phishing

a scam that tries to trick you into giving out your SSN and other personal information

Trademark

a symbol, word or words legally registered or established as representing a company or product.

How do you know if a website is credible?

a. The author of the website is considered an expert b. Date of website, research c. Sources are cited d. Domain - .edu & .gov - usually safe e. Writing style - poor grammar f. Site design

show/hide command

allows you to see the hidden formatting marks. (home<paragraph<show/hide)

What is text formatting?

bold, italics, or underlining words to emphasize them

What happens when you push the shortcut word - Home?

cursor goes to the beginning of the line.

What are the most effective Communication skills?

reading, writing, speaking, and listening

repeat command

repeats the most recent action

How do you maintain adaptability in the workplace?

stay calm and develop a solution

What is a cover letter?

supplements resume, highlights key points in resume, expresses interest in a position, shows qualifications to a potential employer and requests and interview.

Cut selected text

t is removed from the document and placed on the clipboard.

Distortion

when people consciously or unconsciously change messages


Related study sets

MCC Mortuary Science Embalming Chemistry & Toxicology Test

View Set

PSY 3341 Exam 2 Memory, PSY 3341 - Exam 2

View Set