Case-Based Critical Thinking Questions
?Case 5-2

In PowerPoint 2016, Laura is putting together a year-end presentation of the highlights of her Cheerleading Squad competitions. She wants to insert slides from a prior presentation.
?
Laura wants to display two open presentations side by side so she clicks the ____ tab, and then the Window group, and clicks the Arrange All button.

A. View
B. Home
C. Design
D. Insert


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is used to filter incoming and outgoing traffic?

A) IDS B) IPS C) Firewall D) DMZ

Computer Science & Information Technology

If you want to rotate an object from its center point, you should ____.

A. double-click the Rotate tool B. click the Rotate tool, then use the Move keys C. click Transform, then use the Move keys D. double-click Transform

Computer Science & Information Technology

Which of the following statements is TRUE about queries in Access?

A) Access queries can be created in Design view, Layout view or SQL view. B) Access queries must be created and modified in SQL view. C) Access queries can be created and modified in Design view. D) Access queries can be created in Design view and then modified in SQL view.

Computer Science & Information Technology

Most modern TCP implementations use pseudo-random number generators (PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the (i - 1)st number generated. Explain what network security risks are created if an attacker is able to break such a PRNG so that he can in fact easily compute the ith number

generated, given only the (i - 1)st number generated. What will be an ideal response?

Computer Science & Information Technology