________ is the presentation program in Apache OpenOffice
A) Base
B) Impress
C) Writer
D) Calc
B
Computer Science & Information Technology
You might also like to view...
What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?
A. man in the middle B. brute force C. dictionary D. hash
Computer Science & Information Technology
Every expression begins with a(n):
A) dollar sign ($). B) exclamation mark (!). C) equal sign (=). D) asterisk (*).
Computer Science & Information Technology
Users can create forms that view records that reside in the underlying table or query called the data ________
A) source B) parent C) home D) top-level
Computer Science & Information Technology
Select the Windows backup type that copies the boot files, the Registry, Active Directory on domain controllers, and other critical information.
A. Differential B. Daily C. System State D. Incremental
Computer Science & Information Technology