To ensure that only authorized viewers see your presentation, you can ____.
A. set a password for it.
B. create a custom show
C. email it to them directly
D. add them to the reviewers list
Answer: A
You might also like to view...
After you have completed essential steps following a security breach and have notified the appropriate people, what should be the final step?
A) Copy the logs of all affected systems for use as evidence. B) Perform an emergency audit to determine whatdamage has been done. C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again. D) Change all affected passwords and repair any damage that has been done.
The bullet style for unordered lists can be changed to square using the ____________________ property.
Fill in the blank(s) with the appropriate word(s).
A destructor cannot execute unless it is explicitly called from a program.
Answer the following statement true (T) or false (F)
?Unlike an external style sheet, a(n) _____ style sheet is applied only to the web page in which it is placed.
A. ?linked B. ?internal C. ?embedded D. ?integrated