Similar to outlines, PowerPoint presentation text is organized by _______

a. content categories
b. headings
c. list levels
d. theme styles


Answer: c. list levels

Computer Science & Information Technology

You might also like to view...

Outside of a C++ program, a file is identified by its __________while inside a C++ program, a file is identified by a(n) __________.

a. file number, file name b. file name, file number c. name, address d. name, file stream object e. None of these

Computer Science & Information Technology

____ is a very effective technique for making a Web site easy to use.

A. Content B. Consistency C. Context D. all of the above

Computer Science & Information Technology

Which of the following describes how often a component fails on average?

A. MTBF B. HSM C. MTTR D. NAS

Computer Science & Information Technology

After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?

A. Privilege escalation B. Advanced persistent threat C. Malicious insider threat D. Spear phishing

Computer Science & Information Technology