One way to secure a PowerPoint presentation is to ____.
A. save the PowerPoint presentation on a server
B. create a security password
C. use the Compatibility Checker to analyze the presentation
D. create a macro that can prevent unauthorized access to the presentation
Answer: B
You might also like to view...
Suppose you learn, after you have created a table and added records to the table, that additional fields are required in the table. Discuss the differences between using the ALTER TABLE statement to add the new fields vs. dropping the table and using CREATE TABLE to create a new table with the correct fields.
What will be an ideal response?
You can create a SmartArt graphic in three ways._________________________
Answer the following statement true (T) or false (F)
Analyze the following code:
``` import java.util.Scanner; public class Test { public static void main(String[] args) { int sum = 0; for (int i = 0; i < 100000; i++) { Scanner input = new Scanner(System.in); sum += input.nextInt(); } } } ``` a. The program does not compile because the Scanner input = new Scanner(System.in); statement is inside the loop. b. The program compiles, but does not run because the Scanner input = new Scanner(System.in); statement is inside the loop. c. The program compiles and runs, but it is not efficient and unnecessary to execute the Scanner input = new Scanner(System.in); statement inside the loop. You should move the statement before the loop. d. The program compiles, but does not run because there is not prompting message for entering the input.
What is a Trojan, and how is it installed?
What will be an ideal response?