Once a presentation is complete, the designer can protect the file so no one can open it without a user name.
?
_________________________

Answer the following statement true (T) or false (F)


False

Computer Science & Information Technology

You might also like to view...

The Direction and ________ gradient fill options determine the progression of colors from one area of the slide to another

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Animation group, the ________ control(s) the direction and sequence in which an animation plays

A) Timing Options B) Animation Players C) Effect Options D) Animation Painter

Computer Science & Information Technology

A ____ includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person.

A. PAN B. MAN C. WAN D. LAN

Computer Science & Information Technology

A peer-to-peer (P2P) network is an example of ________ administration.

A. local B. wide area C. central D. corporate

Computer Science & Information Technology