Use the ________ view in PowerPoint to deliver your presentation as an electronic slide show
A) Normal
B) Slide Show
C) Slide Sorter
D) Presenter
B
Computer Science & Information Technology
You might also like to view...
Which of the following DoD security categories applies to systems with the highest level of security?
A) Category A B) Category B C) Category C D) Category D
Computer Science & Information Technology
____________________ data can make parts of a program worthless.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________ is a grid of columns and rows that is used to organize data
A) list B) table C) array D) matrix
Computer Science & Information Technology
A cryptographic hash function is a two-way function.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology