Which of the following is NOT an actual gallery in PowerPoint 2010?

A) Styles gallery B) Colors gallery C) Page Setup gallery D) Fonts gallery


C

Computer Science & Information Technology

You might also like to view...

A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Prerouting

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT true when testing an application?

A) A good application will be easy to use for all levels of Access users, not just the designer. B) Before you have a user go live with your application, it is a good practice to test it on all levels of users, especially those who will actually be using the database and those who have no experience with Access. C) Realize that users are going to experience errors and that you will not be able to fix them all. D) Observe a user under controlled circumstances to determine how he or she will use the application for its intended purpose.

Computer Science & Information Technology

A red triangle in the upper-right corner of a cell indicates the existence of a(n) ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology