To protect a presentation, click ________ on the FILE tab and click Protect Presentation

Fill in the blank(s) with correct word


Info

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a factor a secure VPN design should address?

A. encryption B. authentication C. nonrepudiation D. performance

Computer Science & Information Technology

The margins are indicated in a document by colored lines called guide lines.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ operator is used for determining whether two operands return an equivalent value.

A. And B. Or C. conditional D. logical

Computer Science & Information Technology

Which monitor technology provides the widest viewing angle with rich colors and backlighting?

A. In-plane Switching B. Plasma C. Twisted Nematic D. Cold Cathode Fluorescent Lamp

Computer Science & Information Technology