Case-Based Critical Thinking Questions
?Case 5-2
In PowerPoint 2016, Laura is putting together a year-end presentation of the highlights of her Cheerleading Squad competitions. She wants to insert slides from a prior presentation.
?
Laura wants to display two open presentations side by side so she clicks the ____ tab, and then the Window group, and clicks the Arrange All button.
A. View
B. Home
C. Design
D. Insert
Answer: A
You might also like to view...
Which of the following is used to filter incoming and outgoing traffic?
A) IDS B) IPS C) Firewall D) DMZ
If you want to rotate an object from its center point, you should ____.
A. double-click the Rotate tool B. click the Rotate tool, then use the Move keys C. click Transform, then use the Move keys D. double-click Transform
Which of the following statements is TRUE about queries in Access?
A) Access queries can be created in Design view, Layout view or SQL view. B) Access queries must be created and modified in SQL view. C) Access queries can be created and modified in Design view. D) Access queries can be created in Design view and then modified in SQL view.
Most modern TCP implementations use pseudo-random number generators (PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the (i - 1)st number generated. Explain what network security risks are created if an attacker is able to break such a PRNG so that he can in fact easily compute the ith number
generated, given only the (i - 1)st number generated. What will be an ideal response?