• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/99

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

99 Cards in this Set

  • Front
  • Back

When you increase the indent on a slide's line, this is known as__ the line.

demoting

When using a public Wi-Fi network, when is it safe to send private info over the network?

never

When an outline is imported into a presentation, PowerPoint starts a new slide when it encounters__ formatting

Heading 1

To select three slides and edit them simultaneously, click the first slide and press the___key

ctrl

Enabling the date and time in a footer means it will appear in the ___ of the slide.

lower-left corner

____ is a popular cable type used as a network backbone by major telecommunications companies

Fiber optic

The ____ view displays thumbnail images of all the slides in the presentation

Slide Sorter

A ____ signal is designed to represent computer data in a discrete high (on) or low(off) state

digital

When working with slide masters, hovering over a slide's thumbnail reveals ___.

How many slides in the presentation use that slide master

All of the follwing are cell phone service options EXCEPT ____.

Electronic data interchange

When you enter the wrong GPS position for the start point on a trip you are about to take this is ___

a data-entry error

RIFD tech is most useful in areas where___ is used

automatic identification

You intend to show your presentation to an audience. What type of slide show should you create?

Presented by a speaker

A ___ computer is remotely controlled by a hacker to damage or corrupt a computer resource

zombie

A ___ contains a listing of ther key talking points contained in the presentation

outline

A ___ connects LANs and MANs between cities, across countries, and around the world.

Wide Area Network (WAN)

Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws

updates

Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank is known as a ____ attack

phishing

Criminals collect items such as credit card numbers without the user's knowledge through the use of ___

spyware

The only time it is considered safe to send private info over a public wireless network is if it has ____

none of the above

Many of today's cell phones come equipped with ___ text tech keyboards to enhance texting

predictive

A popular encrpytion method used to protect data that travels over a wireless network is __

WPA

How a cell phone looks, feels, and works is determined by its ___.

form factor

Signal Frequency is measured in __

hertz

A device or software that filters the info coming onto a network is called a ____

firewall

It is in good practice to create a ____ which provides the title of your presentation, your name, and the date, of the presentation

title slide

The internet has adopted the ____ set of protocols to define its format of communications between devices

TCP/IP

Which of the following is one realistic way to promote internet security?

strong passwords and change regularly

An area of a building where you can connect to the Internet wirelessly is often referred to as a

hotspot

bluetooth is an example of tech used with a ___ area network

personal

A company called ___ provides digital certifications for the web transactions

VeriSign

When an outline is imported into a presentation, PowerPoint inserts text on a slide when it encounters___ formatting

heading 2

With the help of a ___, devices can modulate signals from one form to another to allow them to connect the Internet

modem

A ___ network includes transmission towers that connect to area handsets

cellular

A __ is a special effect between slides in a presentation

transition

To connect multiple businesses from different locations a _ area network setup could be used

wide

The Mac computer employs the __ system to encrypt its file data

FileVault

All devices attached to a network are identified as __

nodes

Many cities have adopted ____ technology to provide faster Internet speed to their users

WiMAX

The microwave used to heat your food and the cell phones you use are part of the __

electromagnetic spectrum

Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.

RAID

An Item such as a smart card is an example of the ___ form of authentication

something you have

Adding a ___ to a slides means that the presenter can show content on a Wed site during the presentation

hyperlink

To exit a slide show and return to Normal view, press the ___ key

escape

To insert a text box on a slide, click the ___ tab and in the Text group click the Text Box button

Insert

A ___ allows hackers to gain access to important code or info in a software program

security hole

When creating a new presentation, the first consideration should be to determine ___

the purpose of the presentation

When a presentation is to run in a bank lobby kiosk, what show option should be selected?

Loop continuously until 'Esc'

In a practice called ___, someone may manipulate people into performing actions or divulging confidential Info on the internet

social engineering

A presentation might be used by a company's department to discuss a company's plan with its vendors

sales

An Internet-based crime is referred to as a ___ crime

cyber

A typical setup for a ___ network would include computer users sharing a single Internet connection

home

A _ may be used to filter data that may be undesirable

firewall

Apply italic formatting to selected text by clicking the italic button in the ___ group on the Home tab

Font

With the advent of ___ tech, broadband Internet services over cellular networks were made widels

(4)

an important function of a firewall is to protect all the ____ of a network or computer from undesirable data

ports

a ___ is commonly packaged with a new computer system

rescue disk

The purpose of ___ in PowerPoint is to assure that all slides in a presentation have a similar look with similar elements

slide masters

When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.

Network usage policy

The purpose of using __ in a presentation is to support whatever you're saying

graphics

LTW access promises fatster speeds for mobile wireless users and is aimed to be the successor to slower ___ tech

3g

A strong closing helps the audience remember_ during the presentation

what you said

A WiMAX access point has a ___ range

31- mile

A __ is considered a telecommunications device that sends and receives signals

satellite

__ technology may someday replace today's bar code system for identifying items in inventory

RFID

Three types of physical cables that carry a signal are twisted pair,fiber optic, and ___

coaxial

To prevent interference and improve transmission of data, services such as cell phones are allocated at different ___.

frequencies

sites such as eBay are a popular target for __.

Internet fraud

__ are used to ensure that content is lined up consistently across all slides in a presentation

Rulers

__ fees are incurred when you use your phone outside of your carrier's coverage area

Roaming

To protect your wireless devices and the information they hold, you should et up encryption such as ___

WPA2

The language of telecommunications is governed by rules called __

protocols

The most efficient way to share digital files within a home environment is to set up a __ network

home

A new fourth-generation technology called ____ is competing to become the wireless network of choice for high-speed connectivity.

Long Term Evolution

When the ___ check box selected, a grid is overlaid on top of each slide

Gridlines

The __ oversees the setup, maintenance, the implementation of a network in a business environment

system admin

A ___ certificate confirms your credentials when conducting business or other transactions on the web

SSL

On the View tab, the_ view lets you see each slide on its own page with any notes you've added

Notes Page

__ threats are network security threats that originate from within a network

Interior

__ permissions provide registered users with access to there access to the files they need, while restricting access to private resources

User

You can protect yourself from identity theft by using ___ when transmitting info over network connections

encryption

An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ___ scam

phishing

The___ was established to secure and monitor security risks to U.S. networks and the Internet

US-CERT

The points on which you elaborate as you speak represent the presentation's __

message

The https:// protocol in a URL indicates the use of a(n) ____ by the website.

SSL connection

When a transition is applied to a slide, it occurs when__

that slide first appears

Networks designed to serve an entire city are called __ area networks

metropolitan

A common form of authentication is a ____

password

___ which are placed using the View tab, partition each slide into four quadrants

Guides

The___ pane in a presentation is often utilized by presenters to recall key points

Notes

All of the following are examples of malware EXCEPT ___

updates

An individual who illegally downloads copyright-protected software is referred to as a ___

pirate

___ is the electronic transmission and reception of voice and data signals

Telecommunications

We rely on ___ as the dominant technology to provide wireless Internet access in our everyday lives

wireless fidelty

Global positioning system ___ are primarily used to assist travelers in getting from one place to another

revievers

Tagging a photo with geographic data is known as ___

geotagging

The job of the ___ administrator is to control who has access to various network resources such as files and folders

network

A company may hire a __ hacker to learn about vulnerabilities in its system

white-hat

Which of the following should you consider first when purchasing a carrier plan for your cell phone?

usage