To save a presentation as a picture presentation, click Save & Send on the File tab, click ____, then click PowerPoint Picture Presentation.

A. Create PDF/XPS Document
B. Create a Video
C. Change File Type
D. Package Presentation for CD


Answer: C

Computer Science & Information Technology

You might also like to view...

A Trojan horse is a_______ program.

a) resident. b) transient. c) backdoor. d) None of the above.

Computer Science & Information Technology

How many

tags should be used on each page?

What will be an ideal response?

Computer Science & Information Technology

If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed

A. Confidentiality and Availability B. Confidentiality only C. Integrity and Confidentiality D. Availability and Integrity

Computer Science & Information Technology

Only limited application types can be run in a virtual machine. More complex systems like databases and email services cannot be virtualized.

Answer the following statement(s) true (T) or false (F)

Computer Science & Information Technology