When in ________ view, double-click a footnote or endnote reference mark to open the Footnotes or Endnotes pane in order to edit the note

A) Print Layout B) Outline
C) Full Screen Reading D) Draft


D

Computer Science & Information Technology

You might also like to view...

In a(n) ________ topology, nodes can be easily added, removed, or moved, without disrupting the network

Fill in the blank(s) with correct word

Computer Science & Information Technology

A document saved as a web page will either have the MHT or ________ file extension

Fill in the blank(s) with correct word

Computer Science & Information Technology

What should you do if someone is looking over your shoulder as you log on to your computer?

A) Type your password quickly. B) Ask them to leave the room. C) Type your password at your normal pace so that you don't make a mistake, but tap your thumb a couple of times as if you are typing a key. D) Wait until they are not looking to type your password.

Computer Science & Information Technology

In information security, benchmarking is the comparison of past security activities and events against the organization's current performance. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology