Shapes can be added to a slide through the ________ tab

A) Slide Show B) Animations C) Insert D) Design


C

Computer Science & Information Technology

You might also like to view...

The process of vendor evaluation should particularly focus on identifying any new practices for mitigating the security risks associated with ____________________ management.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

From the following list, which of the roadblocks is guaranteed to be a deal killer when trying to launch a new forensic division?

a. High cost b. Security requirements c. Departmental politics d. Failure of executive management to see the need

Computer Science & Information Technology

Referring to a lookup table using ________ cell references enables a user to copy the cell reference to other cells without altering the cell references to the lookup table

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The best tool for testing continuity is a(n) _______________; use a(n) _______________ as a fallback when you don't have the first tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology