Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 50 The _____ has been controversial since it was passed in 1998, and, i

ID: 3726593 • Letter: Q

Question

Question 50

The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented.

Do Not Call Implementation Act

U.S. SAFE WEB Act

Homeland Security Act

Child Online Protection Act

1.5 points

Question 51

_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.

Pharming

Vishing

Phishing

Smishing

1.5 points

Question 52

A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

proxy

virus

firewall

digital signature

1.5 points

Question 53

A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

Trojan horse

firewall

botnet

worm

1.5 points

Question 54

Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time.

True

False

1.5 points

Question 55

_____ refers to the act of breaking into a computer or network.

Encrypting

Authentication

Authorization

Hacking

1.5 points

Question 56

A maximized window can be repositioned.

True

False

1.5 points

Question 57

In the EASE OF ACCESS window, you can turn on the Narrator, which is a _____.

screen reader

color enhancer

theme developer

document reporter

1.5 points

Question 58

If a window is a program window, clicking the Close button can stop the program from running.

True

False

1.5 points

Question 59

When you drag a file or folder from one location to another on the same drive, _____.

the file or folder moves from its original location to the new location

the root directory asks you to rename the file or folder and then place it on the drive

the root directory creates a copy of the file or folder on every drive on the system

the file or folder has a copy of itself created in the new location

1.5 points

Question 60

_____ a file places it in a new location but does not remove it from its current location.

Transforming

Altering

Shifting

Copying

1.5 points

Question 61

You can make Windows 10 more accessible to someone with physical limitations by using the _____ window.

EASE OF ACCESS

PIPELINED BOOKMARKS

LIMITED USABILITY

COMFORT OF INTERFACING

1.5 points

Question 62

To close windows from _____, point to the window you want to close, and then click the Close button that appears.

Print View

Title View

Task View

Web View

1.5 points

Question 63

Permanently deleted files can be retrieved from the Recycle Bin by clicking the Restore All button on the Recycle Bin Tools Manage tab.

True

False

1.5 points

Question 64

The ribbon is an area at the top of File Explorer and some application windows that contains commands for working with the contents of the window.

True

False

1.5 points

Question 65

You can open only one tab at a time in Edge.

True

False

1.5 points

Question 66

Which of the following is true of the HISTORY pane in Microsoft Edge?

It lists Web addresses you have marked as favorites.

It lists the links related to the previous versions of Edge.

It lists the links related to history and evolution of Edge.

It lists Web addresses for the Web sites you have visited.

1.5 points

Question 67

The Print dialog box shows a preview of the printed page based on the current print settings.

True

False

1.5 points

Question 68

If you pin a Web page to the start menu, you:

can find the Web page as a tile on the right side of the menu.

need to first start Edge to open the Web page.

can open the Web page without Internet connection.

need to open the folder containing the Web page every time you want to access it.

1.5 points

Question 69

Which of the following is a difference between the Favorites list and a reading list in Microsoft Edge?

The Favorites list temporarily saves links to Web pages, whereas a reading list saves links to Web pages permanently.

The Favorites list can be organized into folders, whereas a reading list cannot be organized.

The Favorites list contains only Web pages, whereas a reading list contains only Web sites.

The Favorites list can be accessed by clicking a cross-shaped button, whereas a reading list can be accessed by clicking an arrow-shaped button.

1.5 points

Question 70

Which of the following items appears in the Folders list in the left pane of the Mail window?

Drafts

Calendars

Reminders

View settings

1.5 points

Question 71

Even if you delete messages from the Deleted Items folder, the messages are deleted temporarily.

True

False

1.5 points

Question 72

The file content of an attachment appears within the message body of an email.

True

False

1.5 points

Question 73

In the context of tabs, which of the following is true of Microsoft Edge?

Each tab in Edge forgets the Web pages that have been viewed on that tab.

Edge cannot open a link in a new tab.

Edge can open only one tab at a time.

When you start Edge, the start page appears in a tab in the application window.

1.5 points

Question 74

In the context of Microsoft Office 2016, which of the following statements is true of zooming?

It does not allow customization of magnification percentage.

It enhances readability.

It does not resize the content in a workspace.

It is exclusive to Microsoft Word.

1.5 points

Question 75

To select adjacent text in Microsoft Word 2016, after selecting the first block of the text, press and hold the Alt key and use the mouse to drag and select as many other blocks of text as required.

True

False

1.5 points

Question 76

In Microsoft Excel 2016, the Mini toolbar appears whenever you:

deselect a text.

press the Home key on the keyboard.

press the Insert key on the keyboard.

select a text.

1.5 points

Question 77

In the context of Microsoft Office 2016, which of the following statements is true of the system Clipboard?

It can function only when the Clipboard pane is opened.

It is a feature that is unavailable to all Windows 10 applications.

It can contain only the most recently cut or copied items.

It holds the deleted text or object when the Delete key is pressed.

1.5 points

Question 78

Which of the following is true of the Line and Paragraph Spacing button in Microsoft Word 2016?

It is a toggle button.

When clicked, the zoom option is highlighted.

When pointed to, the entire button is shaded.

It is a two-part button.

1.5 points

Question 79

In Microsoft Office 2016, to open a file, you need to first:

click the Home tab.

display the Mailing view.

display the Backstage view.

click the View tab.

1.5 points

Question 80

In Microsoft Office 2016, all of the commands on the Mini toolbar appear nowhere in the ribbon of an application.

True

False

1.5 points

Question 81

Backstage view in Microsoft Office 2016 hides the window containing the open file, including the ribbon.

True

False

1.5 points

Question 82

Which of the following is an example of a gallery in Microsoft PowerPoint 2016?

Variants gallery

Home gallery

Insert gallery

Review gallery

1.5 points

Question 83

_____ can be pressed to promote a subitem to a first-level bullet.

Tab+F8 keys

Shift+Tab keys

Ctrl+F keys

Alt+PageDown keys

1.5 points

Question 84

The larger text placeholder on the title slide is designed to hold a subtitle.

True

False

1.5 points

Question 85

Notes view was designed to make it easier to display a slide show using a second monitor or a projector screen.

True

False

1.5 points

Question 86

The page number appears in the header of notes and handouts by default.

True

False

1.5 points

Question 87

Which of the following is true of slide animations in Microsoft PowerPoint 2016?

After you apply an animation to an object on a slide, an animation sequence icon appears near the upper-right corner of the object.

The default animation type in PowerPoint is fly-by.

By default, animations are set to start On Click.

Multiple objects within a slide must use the same type of animation effect.

1.5 points

Question 88

Notes view displays slides one at a time and displays thumbnails of all the slides in the Slides pane on the left.

True

False

1.5 points

Question 89

Entrance, Emphasis, Exit, and Motion Paths are the four types of _____ in PowerPoint.

themes

patterns

transitions

animations

1.5 points

Question 90

Which of the following is true of Speaker Notes?

They are used to display each slide in the top half of the presentation window.

They make it easier to display a slide show using a second monitor or a projection screen.

They help the speaker remember what to say when a particular slide appears.

They display special effects applied to the text and graphics on each slide or to the slide itself.

1.5 points

Question 91

Printouts of PowerPoint slides in a presentation are called _____.

records

speaker notes

handouts

text placeholders

1.5 points

Question 92

Which of the following is true of transitions in Microsoft PowerPoint 2016?

The transition view displays each slide in the top half of the presentation window and the speaker notes for that slide in the bottom half.

After you apply a transition to an object on a slide, a transition sequence icon appears near the upper-left corner of the object.

You can modify transitions only in Slide Sorter view and Reading view.

The default transition is for one slide to disappear and the next slide to immediately appear on the screen.

1.5 points

Question 93

The font size—the size of the text—in subitems is larger than the size used for text in the level above.

True

False

1.5 points

Question 94

In Slide Master view, the slide numbers in a presentation that use a particular layout can be determined by _____.

pointing to the layout thumbnail

right clicking on the layout thumbnail

double clicking on the layout thumbnail

dragging the layout thumbnail

1.5 points

Question 95

Which of the following is a way to add graphics to a slide?

Entering the date on a slide

Typing text in a content placeholder

Drawing shapes on a slide

Inserting slide numbers on each slide

1.5 points

Question 96

When a text box is active, _____.

its border is a solid line

its border is a dotted line

it does not have a sizing handle

it does not have a border

1.5 points

Question 97

When you save a presentation as a PDF file, each slide becomes a page in the PDF file by default.

True

False

1.5 points

Question 98

Which of the following should be done if a graphic jumps from one location to another as you drag it and if you cannot position it exactly where you want it to be?

Press and hold the Ctrl key as you drag the graphic.

Press the Esc key after selecting the graphic.

Press and hold the Alt key as you drag the graphic.

Press the Tab key after selecting the graphic.

1.5 points

Question 99

Which of the following statements is true of formatting graphics?

The Remove Background tool is available to all shapes.

The Fill command is available only to shapes.

The Rotate option is available only to pictures.

The Change Shape command is available to all pictures.

1.5 points

Question 100

Options on the Color button menu are used to adjust the color saturation.

True

False

a.

Do Not Call Implementation Act

b.

U.S. SAFE WEB Act

c.

Homeland Security Act

d.

Child Online Protection Act

Explanation / Answer

Answering to the first 4 questions according to Chegg Policy

Q:50

Ans: Child Online Protection Act

Explanation:

The law passed in 1998 for minors to restrict them from accessing harmful materials from internet. But to be sad the law never ever took its effect as there was 3 different round letigation in the year 2009 which led to the injuction of the law permanently.

Q:51

Ans: Phishing

Expanation: "Phishing" is the act of sending emails from an unknown source in order to reveal the sensitive information like password, card number etc. from the end user in unlawful act. These are often some mails that are received, stating to be from some well known source for the user advantage but the sole purpose of these mails are to reveal the sensitive information from user.

52:

Ans:  virus

Explanation: virus (Vital Information Resources Under Seize) is the kind of mallicious soaftware which gets installed without prior intimation to the user inorder to corrupt and seize user information. These softwares often replicate themselves.

Q:53

Ans: firewall

Explanation: Firewall is used to prevent the un authorized access to the private network. It can be implemented either in the form of hardware or may be software. Here every request arise to of from the private network has to be pass through the firewall for the security purpose.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote