Word automatically assigns ________ to each paragraph to create different levels, when you type a paragraph in Outline view
A) font styles
B) end-of-paragraph marks
C) paragraph names
D) heading styles
D
You might also like to view...
The process of moving a slide object to a new location using the mouse pointer is called ____.
A. drop and drag B. drag and drop C. drag and drip D. slide and drop
Clicking the Show/Hide button on the Home tab of the Ribbon displays ________
A) formatting marks B) headers and footers C) Clipboard content D) styles applied to the document
Which sentence demonstrates correct punctuation of a direct quotation??
A. ?George Orwell wrote a mass of . . . words falls upon the facts like soft snow, blurring the outline covering up all the details. B. ?George Orwell wrote, "A mass of . . . words falls upon the facts like soft snow, blurring the outline covering up all the details." C. ?George Orwell wrote, "a mass of . . . words falls upon the facts like soft snow, blurring the outline covering up all the details.
?Match the following terms with the correct definitions below:?
A. ?The NSA's approach to implementing a layered network defense strategy. It focuses on three modes of protection: people, technology, and operations. B. ?A type of DoS attack in which other online machines are used, without the owner's knowledge, to launch an attack. C. A computer or network set up to lure an attacker.? D. ?Intrusion prevention and monitoring systems that track what attackers do on honeypots. E. An approach to network hardening that sets up several network layers to place the most valuable data at the innermost part of the network? F. The process of collecting and analyzing raw network data and systematically tracking network traffic to determine how security incidents occur.? G. ?A virtual machine interface that loads on physical hardware and contains its own OS. H. A virtual machine interface that's loaded on top of an existing OS.? I. Attacks launched before vendors or network administrators have discovered vulnerabilities and patches for them have been released.? J. Computers used without the owners' knowledge in a DDoS attack.?