Which of the following statements about inserting an outline is NOT true?

A) Heading 1 style is applied to the slide titles.
B) Heading 2 style is applied to the bulleted text.
C) Objects such as pictures, charts, SmartArt, and shapes do not display.
D) Heading 3 style is applied to paragraphs.


D

Computer Science & Information Technology

You might also like to view...

Which of the following sets of statements will set floating point output to the stream outStream to fixed point with set 3 places of decimals? In the explanation, you must give any necessary #include directives and using directives or declarations.

a) ``` outStream.setf(ios::fixed); outStream.setf(ios::showpoint); outStream.precision(2); ``` b) ``` outStream.setf(ios::fixed | ios::showpoint); outStream << setprecision(2); ``` c) ``` outStream << setflag(ios::fixed); outStream << setflag(ios::showpoint); outStream << setprecision(2); ``` d) ``` outStream.flags(ios::fixed); outStream.flags(ios::showpoint); outStream.precision(2); ```

Computer Science & Information Technology

Which of the following best describes the relationship between hardware improvements and time complexity improvements in regards to program execution time?

A. An improvement in the time complexity of a program can cause the program to run many times faster than a typical hardware improvement. B. Hardware improvements always do more to speed up a program than a better time complexity ever could. C. Hardware improvements and time complexity improvements are currently about the same in speeding up the execution of a program. D. Hardware improvement are often slightly better than time complexity improvements in speeding up a program; if a hardware improvement is not slightly better, then it is about the same as an improvement in time complexity (typically)

Computer Science & Information Technology

Space inserted to make a document more readable is called

a. special space b. white space c. CSS space d. HTML space

Computer Science & Information Technology

Using a network without the network owner's permission is known as ________

A) phishing B) hijacking C) spamming D) piggybacking

Computer Science & Information Technology