To protect a presentation, click ________ on the FILE tab and click Protect Presentation
Fill in the blank(s) with correct word
Info
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a factor a secure VPN design should address?
A. encryption B. authentication C. nonrepudiation D. performance
Computer Science & Information Technology
The margins are indicated in a document by colored lines called guide lines.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ____ operator is used for determining whether two operands return an equivalent value.
A. And B. Or C. conditional D. logical
Computer Science & Information Technology
Which monitor technology provides the widest viewing angle with rich colors and backlighting?
A. In-plane Switching B. Plasma C. Twisted Nematic D. Cold Cathode Fluorescent Lamp
Computer Science & Information Technology