How do you set application defaults?
What will be an ideal response?
Make changes in the user interface (font, point size, fill color,
etc.) when no documents are open.
Computer Science & Information Technology
You might also like to view...
Secure space should always be accessed through ____.
A. secure perimeters B. secure gateways C. secure tunnels D. secure retreats
Computer Science & Information Technology
There are three types of business reports.
a. Initialization, process, termination b. Detail, summary, and exception c. Heading, Detail lines, Summary d. Input, process, output e. None of the above.
Computer Science & Information Technology
A(n) ________ server is used to host an Internet site
Fill in the blank(s) with correct word
Computer Science & Information Technology
In its broadest definition, a(n) ____________ is a collection of information.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology