Details about a presentation can be found in the presentation file's ____________________.
Fill in the blank(s) with the appropriate word(s).
document properties
Computer Science & Information Technology
You might also like to view...
If a Web address uses a secure protocol, it will begin with ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A ________ is a software program or hardware devices that prevents unauthorized access to your computer
A) botnet B) zombie C) key logger D) firewall
Computer Science & Information Technology