Details about a presentation can be found in the presentation file's ____________________.

Fill in the blank(s) with the appropriate word(s).

document properties

Computer Science & Information Technology

You might also like to view...

If a Web address uses a secure protocol, it will begin with ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ________ is a software program or hardware devices that prevents unauthorized access to your computer

A) botnet B) zombie C) key logger D) firewall

Computer Science & Information Technology