When you change Word options, the changes apply to:

A) the current document only.
B) previously saved documents that you open, but not documents that you create.
C) all documents saved to SkyDrive.
D) all documents, not just the current document.


D

Computer Science & Information Technology

You might also like to view...

When a button is clicked, the browser

a. looks for an onclick event handler b. looks for the JavaScript program to download c. creates the button for the program d. none of the above

Computer Science & Information Technology

Critical Thinking QuestionsCase G-1Sidney works in management for BusyBody Toymakers. She has just been named project manager for a team who will develop a new website showcasing this year's most popular toys. As Sidney directs the work of the design team, she recommends the use of CSS page layouts in Dreamweaver to control the position of text and graphic elements with precision. Sidney asks a designer what errors can be found by using the Browser Compatibility Check feature in Dreamweaver. What answer should the designer give the project manager?

A. The BCC feature will flag errors that probably won't cause a serious display problem. B. The BCC feature will flag errors that could cause a serious display problem. C. The BCC feature will find code that is unsupported, but won't cause a serious display problem. D. All of the above

Computer Science & Information Technology

________ can be used to quickly format text

Fill in the blank(s) with correct word

Computer Science & Information Technology

An instance is launched into a VPC subnet with the network ACL configured to allow all inbound traffic and deny all outbound traffic. The instance's security group is configured to allow SSH from any IP address and deny all outbound traffic. What changes need to be made to allow SSH access to the instance?

A. The outbound security group needs to be modified to allow outbound traffic. B. The outbound network ACL needs to be modified to allow outbound traffic. C. Nothing, it can be accessed from any IP address using SSH. D. Both the outbound security group and outbound network ACL need to be modified to allow outbound traffic.

Computer Science & Information Technology