Home Tab
Insert Tab
Basic Word Features
Identify Theft
Credible Websites
100

Where you would go to put pictures or images to the center of your document. 

What is Align Center

100

I want to add an image to a document. What function would I use? 

What is Pictures. 

100

Microsoft Office applications share a feature which is located across the top of the screen. What is it called?

The Ribbon

100

The fraudulent appropriation and use of someone’s personal data.

What is identity theft?

100

Sending an email to a victim while being disguised to look like official communications from a legitimate website.

What is phishing?

200

I have a list of items that need to be put in a general list.  What function would I use? 

What is bulleted list

200

End the current page and move to the next page. What function would I use? 

What is Page Break

200

How many selections can you save on MS Word’s clipboard?

24 items saved

200

What is the first step you take if you believe you are a victim of identity theft?

File a police report.

200

 What does it mean if a website begins with HTTPS ?

It is safer than other websites

300

I need to change all of the font to upper case.  What function am I using? 

What is Increase Font Size

300

Where I would find things like squares, rectangles, triangles and straight lines. 

What is Shapes
300

What zoom percentage shows the document at its normal size?

100%

300

What are some ways that an identity thief can steal someone’s credit card information and other pieces of personal information? Identify 2 ways

Shoulder surfing at ATM machines, dumpster diving in trash bins, stealing mail from mailboxes

300

Identify 3 ways to identify a creditable website

  1. The author of the website is considered an expert

  2. Date of website, research

  3. Sources are cited

  4. Domain - .edu & .gov – usually safe

  5. Writing style – poor grammar

  6. Site design

400

Very small letter just below text is known as what? 

What is Subscript. 

400

I need to show a comparison of items in the form of a percentage. What type of graph would I use? 

What is Pie Chart. 

400

When would you use a numbered list in MS Word?

It is useful when items appear sequentially such as instructions.

400

Name at least 3 ways in which an identity thief can do with your information?

File a change of address form for you at the post office, obtain a passport in your name, write checks using your driver’s license number as an ID.

400

A type of malware that appears to be desirable thus tricking the user into allowing the program access to their computer.

What is a Trojan Horse?

500

To move my paragraph further from the margin, what function would I use? 

What is Increase Indent

500

You want to make a great impression to your word document by providing an intro page.  What function would I use? 

What is Cover Page

500

What are the 3 steps to change the margin settings?

Layout tab > page setup group > margins dropdown.

500

When creating passwords and PIN numbers what are the 3 most common pieces of information you should avoid using that an identity thief commonly uses to steal information?

Your birthdate, last four digits of your social security number, your middle name

500

Identify 2 examples of malware?

Viruses, worms, Trojan horses.