A citation or source in a presentation is placed ________

A) on the same slide as the content copied
B) on the last slide of the presentation
C) on the first slide of the presentation
D) in a comment on the same slide as the content copies


A

Computer Science & Information Technology

You might also like to view...

When working with your photo, you can drag the ________ border to crop the photo as necessary

A) blue B) red C) green D) yellow

Computer Science & Information Technology

Spooling is a security threat that relies on cleartext transmission whereby the assailant falsifies the IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________

A) toolbar B) add-on C) tab D) plug-in

Computer Science & Information Technology

Text that you type into a Search box to locate specific files is known as search ________

Fill in the blank(s) with correct word

Computer Science & Information Technology