Once a presentation is complete, the designer can protect the file so no one can open it without a user name.
?
_________________________
Answer the following statement true (T) or false (F)
False
Computer Science & Information Technology
You might also like to view...
The Direction and ________ gradient fill options determine the progression of colors from one area of the slide to another
Fill in the blank(s) with correct word
Computer Science & Information Technology
In the Animation group, the ________ control(s) the direction and sequence in which an animation plays
A) Timing Options B) Animation Players C) Effect Options D) Animation Painter
Computer Science & Information Technology
A ____ includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person.
A. PAN B. MAN C. WAN D. LAN
Computer Science & Information Technology
A peer-to-peer (P2P) network is an example of ________ administration.
A. local B. wide area C. central D. corporate
Computer Science & Information Technology