When a Slide Master is being edited, changes that affect all slide layouts are displayed in the ________ that display on the left of the screen

Fill in the blank(s) with correct word


thumbnails

Computer Science & Information Technology

You might also like to view...

The compression and encryption attributes for disk files are mutually exclusive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Cryptography is important because it ________.

a) protects system components from malicious users b) encodes and decodes messages so that it can be interpreted only by the intended recipients c) restricts the capabilities of untrusted users of a system d) protects a network from intruders

Computer Science & Information Technology

The recursive Sierpinski gasket algorithm is an example of ____ because it calls itself three times.

A. linear recursion B. mutual recursion C. exponential recursion D. iteration

Computer Science & Information Technology

The default style of a footnote is the same as the style required for MLA footnotes.

a. true b. false

Computer Science & Information Technology