When a presentation has only a few slides, you easily can drag and drop the slide thumbnails in the ____ pane.

A. Notes
B. Slides
C. Research
D. Outline


Answer: B

Computer Science & Information Technology

You might also like to view...

Known as the ping service, use of ____ traffic is a common method for hacker reconnaissance and should be turned off to prevent snooping.

A. ICMP B. UDP C. SMTP D. IPconfig

Computer Science & Information Technology

You can declare two variables with the same name in __________.

a. a method one as a formal parameter and the other as a local variable b. a block c. two nested blocks in a method (two nested blocks means one being inside the other) d. different methods in a class

Computer Science & Information Technology

Prompt the user to enter an integer.

What will be an ideal response?

Computer Science & Information Technology

The ____________________ behavior enables you to specify which data you want to retrieve from the database and display in the Web page.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology