When in ________ view, double-click a footnote or endnote reference mark to open the Footnotes or Endnotes pane in order to edit the note
A) Print Layout B) Outline
C) Full Screen Reading D) Draft
D
You might also like to view...
In a(n) ________ topology, nodes can be easily added, removed, or moved, without disrupting the network
Fill in the blank(s) with correct word
A document saved as a web page will either have the MHT or ________ file extension
Fill in the blank(s) with correct word
What should you do if someone is looking over your shoulder as you log on to your computer?
A) Type your password quickly. B) Ask them to leave the room. C) Type your password at your normal pace so that you don't make a mistake, but tap your thumb a couple of times as if you are typing a key. D) Wait until they are not looking to type your password.
In information security, benchmarking is the comparison of past security activities and events against the organization's current performance. _________________________
Answer the following statement true (T) or false (F)