Use the ________ view in PowerPoint to deliver your presentation as an electronic slide show

A) Normal
B) Slide Show
C) Slide Sorter
D) Presenter


B

Computer Science & Information Technology

You might also like to view...

Which of the following DoD security categories applies to systems with the highest level of security?

A) Category A B) Category B C) Category C D) Category D

Computer Science & Information Technology

____________________ data can make parts of a program worthless.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a grid of columns and rows that is used to organize data

A) list B) table C) array D) matrix

Computer Science & Information Technology

A cryptographic hash function is a two-way function.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology