A(n) ________ is a special type of shape that you can add to your presentation and to which

you can assign an action.

Fill in the blank(s) with correct word


action button

Computer Science & Information Technology

You might also like to view...

Explain the similarities and differences of this protocol to SET.

A merchant using the SSL protocol (without SET) might implement a credit card transaction as follows: The customer purchases an item, and the merchant asks him to send his credit card information encrypted using the session key established with the SSL protocol. When the merchant receives that information, she initiates a separate transaction with the credit card company to have the purchase approved. When that transaction commits, the merchant commits the transaction with the customer.

Computer Science & Information Technology

If the font size for a paragraph is set to 12 points, then 3 em is equal to ____ points.

A. 12 B. 15 C. 36 D. 48

Computer Science & Information Technology

________ is the destruction of hardware, software, or data.

A. Extortion B. Hacking C. Denial of Service D. Sabotage

Computer Science & Information Technology

The __________ operator is used to raise 5 to the second power.

a. MOD b. * c. ^ d. /

Computer Science & Information Technology