In order to import content from a Word file for slides, the Word file needs to use ________

A) columns B) bolding C) tabs D) heading levels


D

Computer Science & Information Technology

You might also like to view...

COUNT, AVERAGE, MIN, and MAX are examples of Excel ________

A) formulas B) functions C) arguments D) expressions

Computer Science & Information Technology

A SIM card stores information such as

A) Just personal contacts B) Satellite phone directories, subscribers' identification codes, and user codes C) Country codes, network codes, password codes for the user, and security codes D) Personal contacts, numbers, phone services, security authentication, and a security PIN

Computer Science & Information Technology

Exposing employee and customer personal data to an untrusted environment is an example of:

a. data spam. b. data phishing. c. data adware. d. data breach.

Computer Science & Information Technology

If you have two embedded styles, you can tell which one takes precedence by its position in the ____ selector.

A. tag B. style C. history D. code

Computer Science & Information Technology