Which of the following is NOT part of the Protect Presentation feature of PowerPoint?

A) Document Inspector B) Add a Digital Signature
C) Encrypt with Password D) Mark as Final


A

Computer Science & Information Technology

You might also like to view...

Which would be the correct way to instantiate a containerClass object in your main program?

template class containerClass { public: containerClass(); containerClass(int newMaxSize); containerClass(const containerClass& source); ~containerClass(); T getItem(); int getCount(); int getSize(); void addItem(T item); private: T *container; int maxSize, count; }; a. containerClass myContainer; b. containerClass myContainer; c. containerClass myContainer; d. containerClass myContainer

Computer Science & Information Technology

Under UNIX, the file name __________ can refer to any file named data that has a 1-, 2-, or 3-character extension.

a. data.??? b. data.? c. data.* d. none of the above

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 20-1Kyra is learning about e-mail security for a test she has tomorrow on Internet security. Answer these three questions from the sample quiz. What should you do if spam gets out of hand?

A. Delete all spam messages. B. Change your e-mail account. C. Reboot your computer. D. Ignore it.

Computer Science & Information Technology

The variable employee[0].rate refers to the ____.

A. rate member of the second employee B. employee member of the second rate C. employee member of the third rate D. rate member of the first employee

Computer Science & Information Technology