Clicking the Show/Hide button on the Home tab of the Ribbon displays ________
A) formatting marks
B) headers and footers
C) Clipboard content
D) styles applied to the document
A
You might also like to view...
A computer program that converts assembly-language programs to machine language programs is called a(n) _______ .
Fill in the blank(s) with the appropriate word(s).
Every computer contains a(n) ____ to send and receive data from other computers over a network.
A. network interface card (NIC) B. firewall C. TCP Wrapper D. NIS module
Case WDX 1-1Sharon is working on a sensitive company document and needs to make sure only authorized personnel can view or make changes to the document. Sharon wants to use Information Rights Management to restrict access to the document. Which command on the Protect Document button menu should she use?
A. Mark as Final B. Encrypt with Password C. Restrict Permission by People D. Restrict Editing
An AVL tree differs from the binary search tree in that after inserting a node, as we back out of the tree, we constantly check the balance of each node.
Answer the following statement true (T) or false (F)