A hidden slide can be identified by the ________

A) gap indicating a missing slide in the Slides/Outline pane
B) diagonal line through the slide number in the Slides/Outline pane
C) special chime that plays when the slide is skipped
D) dimmed out slide in the Slide pane


B

Computer Science & Information Technology

You might also like to view...

You can use the ________ button to arrange tabs, groups, and commands in any order

A) Add B) Move Up C) Reset D) Rename

Computer Science & Information Technology

In a data collector set, a ____ contains only those instances when events occur.

A. memory dump B. trace report C. trace D. mini dump

Computer Science & Information Technology

When using the Windows Encrypted File System, what statement is accurate?

a. files can be marked for encryption, but not folders b. an encrypted file moved to an unencrypted folder remains encrypted c. EFS only works on NTFS and FAT32 d. you need to download special software to use EFS

Computer Science & Information Technology

Security attacks are isolated against organizations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology