Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Presenter View is Your Secret Weapon for Killer Presentations

Presenter View is Your Secret Weapon for Killer Presentations

Presentation anxiety is very real and can present itself in various ways, from dry mouth to sweaty palms to a sudden loss for words. It’s a legitimate phobia that people have, which makes it all the more helpful that modern presentation tools offer a feature to help mitigate its impact: Presenter View.

Let’s talk about how to put Presenter View to use in either Microsoft PowerPoint or Google Slides.

What is Presenter View?

Whichever of the big two slideshow programs you use, you have access to something called Presenter View. This mode allows you to distinguish between what you see and what is shared with your audience.

Instead of simply relying on the slides that your audience can see to guide you through your presentation, Presenter View provides you with a dashboard of tools that you can use to enhance its quality. So, provided you have access to multiple screens (such as a laptop and the projector being used), you can extend your display to show both options, all while sharing only the view your audience needs to see with them, while still being able to view your internal notes.

How Presenter View Can Help Enhance Your Presentation

  • Access to your notes - You can cover every point you want to make by preparing and referring back to your presentation notes.
  • A look ahead - In addition to your current slide, you also get a preview of the slide coming up next, allowing you to lead from one to the other more effectively.
  • A time clock - Presenter View also has a built-in timer to help you keep track of your time and pacing while still remaining professional.
  • Audience engagement in Google Slides - If using Google’s presentation software, you have access to Audience Tools that allow you to field submitted questions in real time.
  • On-Screen Tools in PowerPoint - If you’re using PowerPoint, you also have access to things like a digital laser pointer, a highlighter, and pen to direct the attention of your audience.

How to Start Presenter View

In Microsoft PowerPoint

With a second display connected and ready to go, access the Slide Show tab. Then, in Monitors, select the Use Presenter View option. You can then decide whether to start the presentation From Beginning or From Current Slide.

You will have access to a variety of information via this interface:

  • The current slide will be viewable in the Main Window.
  • The Preview Pane will show the next slide.
  • The Speaker Notes Pane features your notes with adjustable font size capabilities.
  • The Top Bar, which features your timer and display settings.
  • The Bottom Toolbar, where you can access the built-in laser pointer, your slide overview, and zoom capabilities.

In Google Slides

Again, with a second display connected, find the Slideshow option in the top-right corner and access the menu. From there, select Presenter view. Your browser will open a new tab with your presentation, along with a Presenter View window for your reference.

From here, you can access various capabilities:

  • A separate window to control your presentation.
  • Simple Slide Navigation tools that also enable you to jump slides.
  • A timer tab that allows you to keep pace.
  • Your speaker notes, fully scrollable, for the active slide.
  • A tab of Audience Tools, allowing you to collect questions in real-time and answer them appropriately.

Make Sure Your Tech is Up to the Task, Too

Either form of Presenter View can make your presentations much more impactful… provided your underlying technology is up to the task. We can help ensure it is through our proactive IT support.

If you’re interested in making sure your business technology is reliable (and yes, reliably impressive), reach out to us to learn more! Give us a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery Android AI Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Miscellaneous Information Holiday Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Bandwidth Virtualization Wi-Fi Blockchain Windows 10 Apps Data Security Two-factor Authentication Vendor Mobile Office Gmail Budget Tip of the week WiFi Managed Services Apple Voice over Internet Protocol App Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Marketing Applications Office 365 Access Control 2FA Help Desk Storage Password Bring Your Own Device Big Data Retail Healthcare Managed IT Services Operating System Computers Risk Management Website Router Virtual Private Network Analytics Office Tips Augmented Reality Health Monitoring Excel The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Customer Service Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Display Printer Paperless Office Firewall Windows 11 Infrastructure Data Storage Smart Technology Supply Chain Safety Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Mouse Virtual Machines Professional Services Administration Managed IT Service Maintenance Downloads Antivirus iPhone Licensing Entertainment Customer Relationship Management Vulnerabilities Settings Data Privacy Printing Wireless Images 101 Content Filtering Hacking Presentation Multi-Factor Authentication YouTube Robot Mobility Telephone System Cost Management Cryptocurrency Wireless Technology IT Management Meetings Virtual Desktop VPN Employees Data storage LiFi Integration Modem Word User Tip Processor Outlook Computer Repair Mobile Security Money Holidays Humor Hacks Websites Mirgation Hypervisor Displays Entrepreneur Scary Stories Shopping Nanotechnology Optimization PowerPoint Fun SharePoint Addiction Deep Learning Electronic Medical Records Language Employer/Employee Relationships Outsourcing Undo Chatbots Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Education Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Mobile Computing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Search Download Net Neutrality Application Best Practice Twitter Alerts SQL Server Technology Care Error History Buisness Business Communications Financial Data Browsers Smartwatch IBM Legal Connectivity IT IT solutions Social Engineering Break Fix Scams Upload Procurement Business Growth Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Tablet IoT Communitications Dark Web Cables Cortana Trends Supply Chain Management Alt Codes Alert Competition File Sharing Regulations Downtime Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Hosted Solution How To Microsoft Excel IT Maintenance Gamification Flexibility Typing Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Drive Google Maps Smart Devices User Ransmoware Knowledge Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Health IT Unified Threat Management Directions Videos IP Address Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Running Cable Bitcoin Wasting Time Threats Google Wallet Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Recovery Fraud Meta Laptop Username Hard Drives Windows 8 Managing Costs Amazon Domains Drones Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Halloween Media Network Management Refrigeration Tech Support IT Technicians Virtual Machine Environment Proxy Server Reviews Public Speaking Cookies Monitors Cyber Monday Medical IT Lithium-ion battery Tactics Development Hotspot Transportation Small Businesses

Blog Archive