How do you set application defaults?

What will be an ideal response?


Make changes in the user interface (font, point size, fill color,
etc.) when no documents are open.

Computer Science & Information Technology

You might also like to view...

Secure space should always be accessed through ____.

A. secure perimeters B. secure gateways C. secure tunnels D. secure retreats

Computer Science & Information Technology

There are three types of business reports.

a. Initialization, process, termination b. Detail, summary, and exception c. Heading, Detail lines, Summary d. Input, process, output e. None of the above.

Computer Science & Information Technology

A(n) ________ server is used to host an Internet site

Fill in the blank(s) with correct word

Computer Science & Information Technology

In its broadest definition, a(n) ____________ is a collection of information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology