Different levels in a document are visible in ________ view

A) Layout
B) Design
C) Master
D) Outline


D

Computer Science & Information Technology

You might also like to view...

An intrusion is any access to data or programs by hackers, criminals, or other unauthorized persons.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A specialty search engine is a(n) ________

A) launch style search engine B) search engine that searches only sites that are relevant to a particular topic C) spider program which collects hits over time D) internal website search

Computer Science & Information Technology

If you do not specify a destination directory when running TFTP, you will overwrite your own /etc/passwd file

Indicate whether the statement is true or false.

Computer Science & Information Technology

Which is a useful approach when a customer cannot define requirements clearly?

A. The prototyping model of software development B. The waterfall model of software development C. The spiral model of software development D. The incremental model of software development

Computer Science & Information Technology