BCIS 2610 -- EXAM 3 STUDY GUIDE Exam Time: When your section meets (the exam duration is 50 minutes). Exam Location: Where your section normally meets. REMINDER OF EXAM POLICIES 1. You must take the exam with your section; otherwise your grade will be zero. 2. You must present your Student ID card, or other acceptable picture ID, when turning in the exam. 3. Closed books, closed notes 4. No electronic devices. Cell phones must be switched off. EXAM ADMINISTRATION We do not supply you with pencils. Bring two sharpened No. 2 pencils, and a good eraser that does not leave smudges. We will supply the machine-readable sheet(s) for you to use, as well as a numbered exam. Follow the instructions provided by your section s instructor. MATERIAL TO BE COVERED ON THIS EXAM *** (This is an NOT an exhaustive list of topics, but paying more attention on these areas will help you focus your exam preparation effort.)*** MORLEY CHAPTER 4: Network and Internet Security 1. Sending an e-mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called. (Answer: c) a. hacking b. online auction fraud c. phishing d. None of the above 2. True or False: Most spyware is installed on a PC without the user s knowledge. (Answer: True) 3. Using someone else s identity to purchase goods or services or perform other transactions is called. (Answer: identity theft) 4. You can find out if someone else has signed up for a credit card in your name by viewing your. (Answer: c) a. digital certificate b. antispyware results c. credit report d. all of the above 5. True or False: A digital signature is used to encrypt the contents of an email message so it cannot be understood if intercepted. (Answer: False) 1
6. Digital certificates are obtained from a(n). (Answer: Certificate Authority) 7. Repeated threats or other harassment carried out online is referred to as. (Answer: a) a. cyberstalking b. online pornography c. identity theft d. only a and c are correct answers 8. True or False: Cyberstalkers often find their victims online. (Answer: True) 9. Bullying an individual online is typically referred to as. (Answer: cyberbullying) 10. Which of the following is not a common-sense precaution against cyberstalking? (Answer: c) a. Requesting your personal information to be removed from online directories. b. Not revealing your true name and contact information in chat rooms. c. Monitoring your credit report. d. None of the above 11. True or False: Bikinigirl would be a good name to avoid attracting unwanted attention in a chat room. (Answer: False) 12. occurs when someone sees a teen s explicit photo in a text message or on the Internet and threatens to expose the teen s behavior unless the teen sends more explicit photos. (Answer: Sextortion) 13. Which of the following laws refers to protecting health information stored electronically? (Answer: a) a. HIPAA b. USAPA c. FACTA d. CODIS 14. True or False: It is virtually impossible to create laws that cover network and Internet security issues today. (Answer: False) 15. The Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data. (Answer: SarbanesOxley) KEY TERMS include (page number of definition inside parentheses) Antivirus software (165) Biometric access system (150) Bot (160) Botnet (160) Computer crime (143) Password (148) Pharming (171) Phishing (169) Possessed knowledge access system (148) 2
Computer sabotage (160) Computer virus (161) Computer worm (161) Cyberbullying (177) Cyberstalking (177) Denial of service attack (DoS) (163) Digital certificate (175) Digital ID (175) Digital signature (176) Dot con (166) Encryption (154) Firewall (152) Hacking (144) Identity theft (168) Malware (160) Online auction fraud (172) Possessed object access system (149) Private key encryption (155) Public key encryption (155) Secure Web page (154) Security software (165) Social media hack (171) Spear phishing (170) Trojan horse (161) Two-factor authentication (149) Unauthorized access (144) Unauthorized use (144) Virtual private network (VPN) (156) War driving (146) Wi-Fi piggybacking (146) MORLEY CHAPTER 5: Computer Security and Privacy 1. Which of the following is not a possible computer security concern? (Answer: c) a. Having your PC stolen b. Losing your mobile phone c. Sending a non-sensitive file via e-mail d. Reading barcodes at the market 2. True or False: All individuals should be concerned about security issues surrounding computers and related technology. (Answer: True) 3. Safeguarding a PC against theft and backing up files so that you do not lose important documents are all computer concerns. (Answer: security) 4. Which of the following would not likely be a reason for stealing a notebook PC? (Answer: b) a. For the data contained on the PC b. To use in a denial of service (DoS) attack c. For the value of the hardware d. Non eof the above 5. True or False: It is only important to use a surge suppressor during bad weather, when a lightning strike may occur. (Answer: False) 6. A copy of a file that is created in case the original is damaged is called a(n). (Answer: backup) 3
7. Using a computer to make illegal copies of currency to circulate as real currency is a form of. (Answer: c) a. software piracy b. computer sabotage c. digital counterfeiting d. DMCA 8. True or False: Software piracy is rarely performed today. (Answer: False) 9. is the unauthorized copying of a computer program. (Answer: Software piracy) 10. Which of the following is a possible result of a data breach? (Answer: c) a. Damaged corporate reputation b. Expense of notifying the individuals involved c. Both a. and b. are possible ramifications d. None of the above is a correct answer 11. True or False: The problem of protecting personal privacy and keeping personal information private did not exist before computers and the Internet. (Answer: False) 12. The term refers to the rights of individuals and companies to control how information about them is collected and used. (Answer: information privacy) 13. A document that discloses how your personal information will be used is called a(n). (Answer: a) a. privacy policy b. opt out c. throw-away e-mail address d. freedom of information act document 14. True or False: An e-mail filter can be used to block access to Web pages that the user may find objectionable. (Answer: False) 15. Unsolicited instant messages are called. (Answer: spim) 16. A device that an employee wears so the location of that employee can be monitored on a continual basis is called a(n). (Answer: c) a. computer monitoring program b. magnetic stripe card c. proximity card d. RFID collar 17. True or False: Video surveillance in public locations is very common. (Answer: True) 18. The ability of one computing device on a network to locate and identity another device on that network is known as. (Answer: presence technology) 19. The CAN-SPAM Act. (Answer: b) a. regulates how Web sites can collect information from minors b. requires e-mail marketers to use accurate subject lines and label adult content c. prohibits all spam d. All of the above are correct answers 4
20. True or False: The Children s Online Protection Act (COPA), which makes Internet pornography accessible to minors illegal, has not yet been implemented. (Answer: True) 21. The Do Not Call Implementation Act implemented the. (Answer: National Do Not Call Registry) KEY TERMS include (page number of definition inside parentheses) Computer monitoring software (215) Digital counterfeiting (201) Disaster recovery plan (199) Electronic profiling (207) E-mail filter (211) Employee monitoring (219) Full disk encryption (FDE) (193) Government database (206) Hardware theft (190) Information privacy (204) Marketing database (205) Opt in (213) Opt out (212) Presence technology (220) Privacy (204) Privacy policy (207) Ruggedized device (196) Self-encrypting hard drive (193) Software piracy (200) Spam (208) Spam filter (211) Surge suppressor (196) System failure (190) Throw-away e-mail address (209) Uninterruptible power supply (UPS) (196) Video surveillance (217) MORLEY CHAPTER 8: Emerging Technologies 1. Which of the following is not a type of flat-panel display technology? (Answer: a) a. NFC b. OLED c. IMOD d. All of the above are correct answers 2. True or False: Holographic storage records data just on the surface of the disc, like a CD. (Answer: False) 3. A quantum bit is known as a(n). (Answer: qubit) 5
4. An emerging networking standard designed to connect home entertainment devices is. (Answer: b) a. LTE b. wirelesshd c. mobile WiMAX d. HiMAX 5. True or False: The most common protocol used with wired networks is WiFi. (Answer: False) 6. An emerging wireless standard that can transmit data over a distance of up to 6 miles is. (Answer: WiMAX) 7. A system using knowledge from medical experts that is used to help diagnose patients would be a type of. (Answer: c) a. neural network b. natural language system c. expert system d. genome 8. True or False: A chatterbot is an example of an intelligent agent. (Answer: True) 9. A(n) is a device, controlled by a human operator or a computer, that can move and react to sensory input. (Answer: robot) 10. In robot-assisted surgery, the robot is controlled by. (Answer: a) a. a human surgeon b. another robot c. the patient d. the robot is self-controlled 11. True or False: Videoconferencing can be used to allow physicians to communicate with other physicians or with hospitalized patients. (Answer: True) 12. Using communications technology to provide medical information or services is referred to as. (Answer: telemedicine) 13. A(n) robot can navigate on its own, without being controlled by a human. (Answer: c) a. battlefield b. consumer c. autonomous d. Super Baxter 14. True or False: Battlefield robots are commonly used today by the U.S. military. (Answer: True) 15. A wearable robotic system designed to give an individual additional physical capabilities and protection is called a(n) suit. (Answer: exoskeleton) 6
16. Which of the following is a potential danger related to emerging technologies? (Answer: b) a. Providing better and safer health care b. Allowing medical technology to allow others to control a patient c. Providing individuals with more virtual input devices for use with computers d. Allowing more at-home treatment of patient problems 17. True or False: Not all technological advances are embraced by all individuals. (Answer: True) 18. and privacy issues are ongoing areas of concern in respect to emerging technologies. (Answer: Security) KEY TERMS include (page number of definition inside parentheses) 2D barcode (297) 802.11 (310) 802.16 (310) AI (313) Artificial intelligence (313) Augmented reality (297) Battlefield robot (320) BCI (319) Bluetooth (312) Brain-to-computer interfacing (319) Carbon nanotubes (304) CNTs (304) Exoskeleton suit (321) Expert system (316) Holographic storage (303) Intelligent agent (314) Nanotechnology (304) Neural network (317) Nonvolatile RAM (299) NVRAM (299) OLED (301) Optical computer (306) Organic light emitting diode display (301) Power over Ethernet (PoE ) (309) Quantum computing (306) Robot (317) Robotics (317) Telemedicine (319) Telesurgery (320) Two-dimensional barcode (297) Wi-Fi (802.11) (310) Wi-Fi Direct (313) WiMAX (802.16) (310) Wireless USB (312) 7
MICROSOFT POWERPOINT 2016 MODULE 1: Creating a Presentation REVIEW QUESTIONS -- 1. Know the definitions of and the differences between: a. Formats b. Styles c. Themes 2. Templates. What is Touch Mode and how can you turn it on? (Answer: A mode to which you can switch if you are using a touch screen. You turn it on by clicking the Touch Mode button on the Quick Access Toolbar. If the button is not there, you must add it using the Customize Quick Access Toolbar button.) 3. True/False: Normal view displays slides one at a time in the Slide pane. (Answer: True) 4. True/False: The ribbon increases in height if you activate Touch Mode. (Answer: True) 5. True/False: The font style for the title text and the body must be the same. (Answer: False) 6. True/False: Once you enter text in a placeholder it is referred to as a text box. (Answer: True) 7. True/False: When you point to a button in the PowerPoint interface, a ScreenTip appears. (Answer: True) 8. Can a saved and closed presentation be reopened and edited? (Answer: Yes) 9. Can a closed presentation be opened again if it has not been saved? (Answer: No) 10. What are some reasons why it would be necessary to save several versions of the same file? (Answer: In order to go back and view the original file and subsequent versions before various changes were made.) 11. Why is it important to understand your audience and its needs before preparing a presentation? How would a presentation differ if the audience as 8
mostly teenagers as opposed to a presentation to an audience that is most adults? 12. True/False: When you point to a button in the PowerPoint interface, a ScreenTip appears. (Answer: True) 13. True/False: The Save As screen appears every time you click the Save button. (Answer: False) 14. True/False: You can recover an unsaved presentation. (Answer: True) 15. You can switch from one slide to another by clicking the slide in the Slides tab. (Answer: thumbnails) 16. Moving an item higher in the outline, for example, changing a second-level bullet into a first-level bullet is called:(answer: B) A. Demoting B. Promoting C. AutoCorrect D. Font Style 17. What is Live Preview? (Answer: A feature that some of the commands in the Font group use, which allows you to preview changes on a slide so that you can instantly see what the text will look like if you apply the formatting option.) 18. True/False: Font Style refers to format attributes applied to text, such as bold and italic. (Answer: True) 19. The toolbar that appears alongside text when you select it is called the toolbar (Answer: Mini) 20. To find options when pasting an object, which button do you click? (Answer: The Paste Options button.) 21. True/False: You cannot convert an existing bulleted list into SmartArt. (Answer: False) 22. True/False: The Convert SmartArt Graphic button is on the ANIMATIONS tab on the Ribbon. (Answer: False) 23. Which view provides a good overview of a presentation? (Answer: Slide Sorter view) 24. True/False: The Slide Sorter view displays all the slides in the presentation as thumbnails. (Answer: True) 25. True/False: Slides cannot be rearranged using the Slides tab in Normal view. (Answer: False) 26. True/False: You open Backstage view by clicking the VIEW tab. (Answer: False) 27. True/False: Backstage view contains information about the person who last made changes to the file. (Answer: True) 28. A(n) is a coordinated set of colors, fonts, backgrounds, and effects. (Answer: theme) 29. True/False: Some themes include graphics as part of the slide background. (Answer: True) 30. A theme and its variants are called a(n). (Answer: theme family) 31. Photos that will be uploaded to the Internet should be compressed to ppi. (Answer: 96) 9
32. True/False: The Compress Pictures button is on the PICTURE TOOLSFORMAT tab. (Answer: True) 33. True/False: You can change the compression settings for each individual photo you insert but you cannot change the settings for all photos in the presentation. (Answer: False) 34. The dashed red lines that appear as you drag an object, which indicate the center and top and bottom borders of an object, are called. (Answer: smart guides) 35. handles are the small squares that appear in the corners and in the middle of the sides of the border of a selected object. (Answer: Sizing) 36. What is another name for notes? (Answer: speaker notes) 37. True/False: Speaker notes will appear on the slide show when it is being presented to an audience. (Answer: False) 38. Performing a final check of the spelling of all the text in a presentation is called. (Answer: spell-checking) 39. True/False: You can right-click a flagged word and select a suggested alternate spelling from a shortcut menu. (Answer: True) 40. view displays each slide so that it fills the entire screen with no toolbars or other Windows elements visible on the screen.(answer: Slide Show) 41. True/False: A presentation can be edited in Reading view.(answer: True) 42. True/False: In Slide Show view, the slides in a presentation will advance themselves automatically. (Answer: False) 43. What are the various ways to advance slides manually in a slide show presentation? (Answer: Press the spacebar, the Enter key, the arrow key, or the Page Down key.) 44. To close a presentation, click the button in the upper-right corner of the PowerPoint window. (Answer: Close [X]) MODULE 1 KEY TERMS include aspect ratio AutoCorrect AutoFit Backstage view bulleted item bulleted list Clipboard content placeholder contextual tab copy crop cut PowerPoint presentation media Presenter view Quick Access Toolbar Ribbon ScreenTip second-level bullet sign-in link sizing handle Slide pane Slide Show view Slide Sorter view 10
diagram first-level bullet font Full Page Slides groups of commands Handouts insertion point layout Live Preview Mini toolbar More button navigation bar Normal view Note (speaker note) Notes Pages Notes Pane Notes Page view Numbered list Office Clipboard Outline paste placeholder points slides Slides tab Smart guides SmartArt speaker notes status bar sub item tab task pane template text box text placeholder theme Theme family thumbnails title slide Touch Mode unnumbered list MODULE 2: Adding Media and Special Effects REVIEW QUESTIONS -- 1. Themes can be found on the tab on the Ribbon. (Answer: c) a. FILE b. HOME c. DESIGN d. ANIMATIONS 2. True or False: You can create a custom theme in PowerPoint. (Answer: True) 3. True/False: You can search for clip art using keywords and phrases. (Answer: True) 4. True/False: In PowerPoint, you can search for images in the Office.com clip art collections. (Answer: True) 11
5. True/False: To add a shape to a slide, click a shape in the Shapes gallery and then click in the slide. (Answer: True) 6. True/False: You cannot edit or resize shapes that you selected from the Shapes gallery and inserted into a slide. (Answer: False) 7. True/False: Colors can be changed or special effects can be added to an object. (Answer: True) 8. The gallery on the PICTURE TOOLS FORMAT tab has several style options that you can apply to an object. (Picture Styles) 9. To rotate an object, you can use the. (Answer: B. rotate handle) A. Smart Guide B. rotate handle C. Shapes Gallery D. Insert tab 10. A is information arranged in horizontal rows and vertical columns. (Answer: D) A. cell B. layout C. structure D. table 11. You can open the Symbol dialog box by clicking the Symbol button on the tab. (Answer: D) A. HOME B. DESIGN C. LAYOUT D. INSERT 12. True/False: By default, headers and footers will show on the title slide. (Answer: True) 13. True/False: You can click the Transition button or the Slide Number button to open the Header & Footer dialog box. (Answer: False) 14. True/False: You can have sounds accompany transitions. (True) 15. The animation type in which text and objects follow a path on a slide is called a(n) path. (Answer: C) A. Entrance B. Crossing C. Motion D. Animation 16. You can find animation commands on the tab on the Ribbon.(Answer: ANIMATIONS) 17. True/False: When you insert a video into a slide, the default is for it to play On Click. (Answer: True) 18. If a video is too long, or there are parts of the video that you don t want to show during the slide show, you can trim it using the button. (Answer: Trim Video) 19. True/False: Pictures added to slides in a presentation are compressed by default to 220 pixels per inch (ppi). (Answer: True) 12
20. True/False: One option to minimize the presentation file size is to compress the pictures in the presentation. (Answer: True) 21. True/False: By default, headers and footers will show on the title slide. (Answer: True) 22. True/False: You can click the Transition button or the Slide Number button to open the Header & Footer dialog box. (Answer: False) MODULE 2 KEY TERMS include adjustment handle animation animation sequence number cell fill footer header keywords poster frame rotate handle style table transition MODULE 3: unassigned for regular sections Read the textbooks, review your lecture notes, and review the PPT homework assignment. Good luck on the Exam! 13