A file format that preserves fonts and other formatting when sharing files with others is ________

A) USB
B) PDF
C) RTF
D) TXT


B

Computer Science & Information Technology

You might also like to view...

Briefly describe the seven coding methods used by companies with examples.?

What will be an ideal response?

Computer Science & Information Technology

What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware?

A. accounting and access model B. user control model C. access control model D. authorization control model

Computer Science & Information Technology

Aside from the SSID, broadcast traffic includes the ____________________, essentially a timing frame sent from the WAP at regular intervals.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Identify the steps used in Phase I of the DM stage of Kimball’s Business Dimensional Lifecycle.

What will be an ideal response?

Computer Science & Information Technology