To protect a presentation, on the File tab click ________, and then click Encrypt with Password
Fill in the blank(s) with correct word
Protect Presentation
You might also like to view...
MC Default arguments are defined in the______.
a) function body. b) function def statement. c) function call. d) None of the above.
What are the four guidelines for employees to follow to prevent phishing attacks?
What will be an ideal response?
Answer the following statements true (T) or false (F)
1. Utilities of information include possession, form, place, access level and time. 2. Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure, so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly. 3. The hub decomposition diagram is useful for showing how the major hubs are connected. 4. Systems analysts engage in an educational process with users that is called training.
Flash is a(n) ____________________ tool, which is a program that creators use to develop and package content for users.
Fill in the blank(s) with the appropriate word(s).