Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Presenter View is Your Secret Weapon for Killer Presentations

Presenter View is Your Secret Weapon for Killer Presentations

Presentation anxiety is very real and can present itself in various ways, from dry mouth to sweaty palms to a sudden loss for words. It’s a legitimate phobia that people have, which makes it all the more helpful that modern presentation tools offer a feature to help mitigate its impact: Presenter View.

Let’s talk about how to put Presenter View to use in either Microsoft PowerPoint or Google Slides.

What is Presenter View?

Whichever of the big two slideshow programs you use, you have access to something called Presenter View. This mode allows you to distinguish between what you see and what is shared with your audience.

Instead of simply relying on the slides that your audience can see to guide you through your presentation, Presenter View provides you with a dashboard of tools that you can use to enhance its quality. So, provided you have access to multiple screens (such as a laptop and the projector being used), you can extend your display to show both options, all while sharing only the view your audience needs to see with them, while still being able to view your internal notes.

How Presenter View Can Help Enhance Your Presentation

  • Access to your notes - You can cover every point you want to make by preparing and referring back to your presentation notes.
  • A look ahead - In addition to your current slide, you also get a preview of the slide coming up next, allowing you to lead from one to the other more effectively.
  • A time clock - Presenter View also has a built-in timer to help you keep track of your time and pacing while still remaining professional.
  • Audience engagement in Google Slides - If using Google’s presentation software, you have access to Audience Tools that allow you to field submitted questions in real time.
  • On-Screen Tools in PowerPoint - If you’re using PowerPoint, you also have access to things like a digital laser pointer, a highlighter, and pen to direct the attention of your audience.

How to Start Presenter View

In Microsoft PowerPoint

With a second display connected and ready to go, access the Slide Show tab. Then, in Monitors, select the Use Presenter View option. You can then decide whether to start the presentation From Beginning or From Current Slide.

You will have access to a variety of information via this interface:

  • The current slide will be viewable in the Main Window.
  • The Preview Pane will show the next slide.
  • The Speaker Notes Pane features your notes with adjustable font size capabilities.
  • The Top Bar, which features your timer and display settings.
  • The Bottom Toolbar, where you can access the built-in laser pointer, your slide overview, and zoom capabilities.

In Google Slides

Again, with a second display connected, find the Slideshow option in the top-right corner and access the menu. From there, select Presenter view. Your browser will open a new tab with your presentation, along with a Presenter View window for your reference.

From here, you can access various capabilities:

  • A separate window to control your presentation.
  • Simple Slide Navigation tools that also enable you to jump slides.
  • A timer tab that allows you to keep pace.
  • Your speaker notes, fully scrollable, for the active slide.
  • A tab of Audience Tools, allowing you to collect questions in real-time and answer them appropriately.

Make Sure Your Tech is Up to the Task, Too

Either form of Presenter View can make your presentations much more impactful… provided your underlying technology is up to the task. We can help ensure it is through our proactive IT support.

If you’re interested in making sure your business technology is reliable (and yes, reliably impressive), reach out to us to learn more! Give us a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Phishing Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Holiday Artificial Intelligence Automation Compliance Cloud Computing Gadgets Training Covid-19 Remote Work Server Outsourced IT Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Mobile Office Managed Services Data Security Two-factor Authentication Vendor Apps Tip of the week Apple App Networking Mobile Device Management Voice over Internet Protocol Gmail WiFi BYOD Chrome Employer-Employee Relationship Budget Hacker Conferencing Avoiding Downtime Marketing Managed IT Services How To BDR Computing Information Technology HIPAA Office 365 Physical Security Applications Access Control Bring Your Own Device Computers Retail 2FA Website Operating System Healthcare Risk Management Router Big Data Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Help Desk Password Customer Service Document Management Windows 11 Managed IT Service Telephone Scam Going Green Excel Data loss Cooperation Remote Workers Cybercrime Firewall Patch Management Save Money Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Free Resource Project Management Windows 7 Social Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Monitoring Mouse Machine Learning Hacking Saving Time Presentation Administration Holidays Wireless Technology Maintenance Data Storage Downloads Supply Chain Antivirus Video Conferencing Managed Services Provider Licensing Virtual Machines Professional Services Settings Wireless Entertainment Printing Word Content Filtering YouTube Robot Cryptocurrency iPhone Telephone System Cost Management Safety Vulnerabilities Data Privacy Virtual Desktop LiFi IT Management Data storage Images 101 Meetings VPN Multi-Factor Authentication Mobility Outlook Modem User Tip Processor Computer Repair Mobile Security Money Humor Customer Relationship Management Employees Smart Technology Integration Sports Education SharePoint Addiction Electronic Medical Records Language Managing Costs Amazon Chatbots eCommerce SSID Management Lenovo Screen Reader Surveillance Writing Distributed Denial of Service Mobile Computing Virtual Assistant Outsource IT Virtual Machine Environment Media Search Service Level Agreement Virtual Reality Computing Infrastructure User Reviews Private Cloud Identity Best Practice Medical IT Server Management Superfish Bookmark Identity Theft Smart Tech Development Transportation Small Businesses Buisness Hypervisor Displays IT solutions Download IP Address Twitter Alerts Legal Shopping Error Optimization Business Growth PowerPoint Browsers Connectivity Social Engineering Break Fix Employer/Employee Relationships Outsourcing Navigation Cortana Upload PCI DSS Remote Computing Recovery Gig Economy Hard Drives Multi-Factor Security Alt Codes Workplace Social Network Tablet IoT Domains Internet Service Provider Dark Web Teamwork Hiring/Firing Downtime Hosted Solution Evernote Paperless Trends Regulations Compliance Alert File Sharing Regulations Refrigeration Memes Dark Data Google Calendar Typing Co-managed IT Managed IT Customer Resource management Data Analysis Star Wars Public Speaking Net Neutrality How To Microsoft Excel SQL Server Technology Care History Business Communications Knowledge Gamification Lithium-ion battery Financial Data Notifications Staff Google Drive Smartwatch Travel Social Networking IT Legislation Entrepreneur Scams 5G Techology Fileless Malware Google Maps Procurement Azure Hybrid Work Cyber security Unified Communications Tech Human Resources Experience Content Telework Wearable Technology Google Docs CES Unified Threat Management Motherboard Undo Communitications Comparison Bitcoin Cables Running Cable Health IT Unified Threat Management Directions Assessment Supply Chain Management Permissions Google Wallet Term Google Apps FinTech IT Assessment Network Congestion Specifications Windows 8 IT Maintenance Laptop User Error Microchip Internet Exlporer Flexibility Fraud Drones Value Business Intelligence Application Shortcuts Username Organization Digital Security Cameras Point of Sale Smart Devices Black Friday Ransmoware Halloween Database IBM Remote Working Memory Vendors Data Breach Google Play Be Proactive Network Management Tech Support IT Technicians Videos Cookies Electronic Health Records Monitors Cyber Monday Hacks Workforce Scary Stories Proxy Server Fun Tactics Hotspot Wasting Time Threats Trend Micro Deep Learning Security Cameras Workplace Strategies Websites Mirgation Nanotechnology Competition Software as a Service Meta

Blog Archive