Match each of the following group to its tab:

I. Variants group
II. Font group
III. Shape Styles group
IV. Media group
V. Start Slide Show group

A. Home tab
B. Format tab
C. Design tab
D. Insert tab
E. Slide Show


C, A, B, D, E

Computer Science & Information Technology

You might also like to view...

Search engines combine ________ with their own proprietary logic to choose which Web pages to display and how to rank them

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the computer crimes on the left with the crime descriptions on the right

1. Computer-assisted crime a. occurs due to the fact that computers are so widely used in today's world 2. Computer-targeted crime b. when a computer is used as a tool to help commit a crime 3. Incidental computer crime c. when a computer is the victim of an attack that's sole purpose is to harm the computer and its owner 4. Computer prevalence crime d. when a computer is involved in a computer crime without being the victim of the attack or the attacker

Computer Science & Information Technology

____________________ is a set of standards designed to enable portability of applications from one computer system to another and has been used particularly for UNIX and Linux systems.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You use the ____ function to return a portion of an array and assign it to another array.

A. array_slice() B. array_set() C. array_assign() D. array_key()

Computer Science & Information Technology