To save a presentation as a picture presentation, click Save & Send on the File tab, click ____, then click PowerPoint Picture Presentation.
A. Create PDF/XPS Document
B. Create a Video
C. Change File Type
D. Package Presentation for CD
Answer: C
Computer Science & Information Technology
You might also like to view...
A Trojan horse is a_______ program.
a) resident. b) transient. c) backdoor. d) None of the above.
Computer Science & Information Technology
How many
tags should be used on each page?
What will be an ideal response?
Computer Science & Information Technology
If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed
A. Confidentiality and Availability B. Confidentiality only C. Integrity and Confidentiality D. Availability and Integrity
Computer Science & Information Technology
Only limited application types can be run in a virtual machine. More complex systems like databases and email services cannot be virtualized.
Answer the following statement(s) true (T) or false (F)
Computer Science & Information Technology