Discuss the use of PowerPoint on a touch screen.

What will be an ideal response?


You can use PowerPoint 2016 on a Windows computer with a touch-enabled monitor or any other compatible touch screen, such as a tablet computer. Using your fingers, you can use typical touch gestures to create, modify and navigate presentations. To enable touch mode capabilities in PowerPoint, you need to add the Touch Mode button to the Quick Access toolbar. Click the Customize Quick Access Toolbar button, click Touch/Mouse Mode, click the Touch/Mouse Mode button on the Quick Access toolbar then click Touch. In Touch mode, additional space is added around all of the buttons and icons in the Ribbon and the status bar to make them easier to touch. Common gestures that you can use in PowerPoint include double-tapping text to edit it and tapping a slide then dragging it to rearrange it in the presentation.

Computer Science & Information Technology

You might also like to view...

________ accepts incoming data flows from other network devices and end systems and forwards them along the data forwarding paths that have been computed and established according to the rules defined by the SDN applications.

A) Control support function B) Northbound API C) Data forwarding function D) Service function chaining

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 15-1Tom is taking a class on computer graphics and how to use them. Tom needs a picture of his college dorm room for a project that he has just been assigned. The easiest way for Tom to get a picture of his dorm room onto his computer is to ____.

A. take a picture of the room with a film camera, take the film to be developed, and then scan the image into his computer B. take the picture with a digital camera and plug the camera into his computer C. search the Internet to see if any of his friends have a picture of his room online D. use a Polaroid camera and tape the picture to his monitor

Computer Science & Information Technology

Design a trigger that works like MaintainCoursesNonEmpty but is a row-level trigger.

What will be an ideal response?

Computer Science & Information Technology

Within Secure Shell (SSH), describe what happens to any packet entering a tunnel.

What will be an ideal response?

Computer Science & Information Technology