Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
99 Cards in this Set
- Front
- Back
When you increase the indent on a slide's line, this is known as__ the line. |
demoting |
|
When using a public Wi-Fi network, when is it safe to send private info over the network? |
never |
|
When an outline is imported into a presentation, PowerPoint starts a new slide when it encounters__ formatting |
Heading 1 |
|
To select three slides and edit them simultaneously, click the first slide and press the___key |
ctrl |
|
Enabling the date and time in a footer means it will appear in the ___ of the slide. |
lower-left corner |
|
____ is a popular cable type used as a network backbone by major telecommunications companies |
Fiber optic |
|
The ____ view displays thumbnail images of all the slides in the presentation |
Slide Sorter |
|
A ____ signal is designed to represent computer data in a discrete high (on) or low(off) state |
digital |
|
When working with slide masters, hovering over a slide's thumbnail reveals ___. |
How many slides in the presentation use that slide master |
|
All of the follwing are cell phone service options EXCEPT ____. |
Electronic data interchange |
|
When you enter the wrong GPS position for the start point on a trip you are about to take this is ___ |
a data-entry error |
|
RIFD tech is most useful in areas where___ is used |
automatic identification |
|
You intend to show your presentation to an audience. What type of slide show should you create? |
Presented by a speaker |
|
A ___ computer is remotely controlled by a hacker to damage or corrupt a computer resource |
zombie |
|
A ___ contains a listing of ther key talking points contained in the presentation |
outline |
|
A ___ connects LANs and MANs between cities, across countries, and around the world. |
Wide Area Network (WAN) |
|
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws |
updates |
|
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank is known as a ____ attack |
phishing |
|
Criminals collect items such as credit card numbers without the user's knowledge through the use of ___ |
spyware |
|
The only time it is considered safe to send private info over a public wireless network is if it has ____ |
none of the above |
|
Many of today's cell phones come equipped with ___ text tech keyboards to enhance texting |
predictive |
|
A popular encrpytion method used to protect data that travels over a wireless network is __ |
WPA |
|
How a cell phone looks, feels, and works is determined by its ___. |
form factor |
|
Signal Frequency is measured in __ |
hertz |
|
A device or software that filters the info coming onto a network is called a ____ |
firewall |
|
It is in good practice to create a ____ which provides the title of your presentation, your name, and the date, of the presentation |
title slide |
|
The internet has adopted the ____ set of protocols to define its format of communications between devices |
TCP/IP |
|
Which of the following is one realistic way to promote internet security? |
strong passwords and change regularly |
|
An area of a building where you can connect to the Internet wirelessly is often referred to as a |
hotspot |
|
bluetooth is an example of tech used with a ___ area network |
personal |
|
A company called ___ provides digital certifications for the web transactions |
VeriSign |
|
When an outline is imported into a presentation, PowerPoint inserts text on a slide when it encounters___ formatting |
heading 2 |
|
With the help of a ___, devices can modulate signals from one form to another to allow them to connect the Internet |
modem |
|
A ___ network includes transmission towers that connect to area handsets |
cellular |
|
A __ is a special effect between slides in a presentation |
transition |
|
To connect multiple businesses from different locations a _ area network setup could be used |
wide |
|
The Mac computer employs the __ system to encrypt its file data |
FileVault |
|
All devices attached to a network are identified as __ |
nodes |
|
Many cities have adopted ____ technology to provide faster Internet speed to their users |
WiMAX |
|
The microwave used to heat your food and the cell phones you use are part of the __ |
electromagnetic spectrum |
|
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data. |
RAID |
|
An Item such as a smart card is an example of the ___ form of authentication |
something you have |
|
Adding a ___ to a slides means that the presenter can show content on a Wed site during the presentation |
hyperlink |
|
To exit a slide show and return to Normal view, press the ___ key |
escape |
|
To insert a text box on a slide, click the ___ tab and in the Text group click the Text Box button |
Insert |
|
A ___ allows hackers to gain access to important code or info in a software program |
security hole |
|
When creating a new presentation, the first consideration should be to determine ___ |
the purpose of the presentation |
|
When a presentation is to run in a bank lobby kiosk, what show option should be selected? |
Loop continuously until 'Esc' |
|
In a practice called ___, someone may manipulate people into performing actions or divulging confidential Info on the internet |
social engineering |
|
A presentation might be used by a company's department to discuss a company's plan with its vendors |
sales |
|
An Internet-based crime is referred to as a ___ crime |
cyber |
|
A typical setup for a ___ network would include computer users sharing a single Internet connection |
home |
|
A _ may be used to filter data that may be undesirable |
firewall |
|
Apply italic formatting to selected text by clicking the italic button in the ___ group on the Home tab |
Font |
|
With the advent of ___ tech, broadband Internet services over cellular networks were made widels |
(4) |
|
an important function of a firewall is to protect all the ____ of a network or computer from undesirable data |
ports |
|
a ___ is commonly packaged with a new computer system |
rescue disk |
|
The purpose of ___ in PowerPoint is to assure that all slides in a presentation have a similar look with similar elements |
slide masters |
|
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources. |
Network usage policy |
|
The purpose of using __ in a presentation is to support whatever you're saying |
graphics |
|
LTW access promises fatster speeds for mobile wireless users and is aimed to be the successor to slower ___ tech |
3g |
|
A strong closing helps the audience remember_ during the presentation |
what you said |
|
A WiMAX access point has a ___ range |
31- mile |
|
A __ is considered a telecommunications device that sends and receives signals |
satellite |
|
__ technology may someday replace today's bar code system for identifying items in inventory |
RFID |
|
Three types of physical cables that carry a signal are twisted pair,fiber optic, and ___ |
coaxial |
|
To prevent interference and improve transmission of data, services such as cell phones are allocated at different ___. |
frequencies |
|
sites such as eBay are a popular target for __. |
Internet fraud |
|
__ are used to ensure that content is lined up consistently across all slides in a presentation |
Rulers |
|
__ fees are incurred when you use your phone outside of your carrier's coverage area |
Roaming |
|
To protect your wireless devices and the information they hold, you should et up encryption such as ___ |
WPA2 |
|
The language of telecommunications is governed by rules called __ |
protocols |
|
The most efficient way to share digital files within a home environment is to set up a __ network |
home |
|
A new fourth-generation technology called ____ is competing to become the wireless network of choice for high-speed connectivity. |
Long Term Evolution |
|
When the ___ check box selected, a grid is overlaid on top of each slide |
Gridlines |
|
The __ oversees the setup, maintenance, the implementation of a network in a business environment |
system admin |
|
A ___ certificate confirms your credentials when conducting business or other transactions on the web |
SSL |
|
On the View tab, the_ view lets you see each slide on its own page with any notes you've added |
Notes Page |
|
__ threats are network security threats that originate from within a network |
Interior |
|
__ permissions provide registered users with access to there access to the files they need, while restricting access to private resources |
User |
|
You can protect yourself from identity theft by using ___ when transmitting info over network connections |
encryption |
|
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ___ scam |
phishing |
|
The___ was established to secure and monitor security risks to U.S. networks and the Internet |
US-CERT |
|
The points on which you elaborate as you speak represent the presentation's __ |
message |
|
The https:// protocol in a URL indicates the use of a(n) ____ by the website. |
SSL connection |
|
When a transition is applied to a slide, it occurs when__ |
that slide first appears |
|
Networks designed to serve an entire city are called __ area networks |
metropolitan |
|
A common form of authentication is a ____ |
password |
|
___ which are placed using the View tab, partition each slide into four quadrants |
Guides |
|
The___ pane in a presentation is often utilized by presenters to recall key points |
Notes |
|
All of the following are examples of malware EXCEPT ___ |
updates |
|
An individual who illegally downloads copyright-protected software is referred to as a ___ |
pirate |
|
___ is the electronic transmission and reception of voice and data signals |
Telecommunications |
|
We rely on ___ as the dominant technology to provide wireless Internet access in our everyday lives |
wireless fidelty |
|
Global positioning system ___ are primarily used to assist travelers in getting from one place to another |
revievers |
|
Tagging a photo with geographic data is known as ___ |
geotagging |
|
The job of the ___ administrator is to control who has access to various network resources such as files and folders |
network |
|
A company may hire a __ hacker to learn about vulnerabilities in its system |
white-hat |
|
Which of the following should you consider first when purchasing a carrier plan for your cell phone? |
usage |