Marking a presentation as final coverts it to what type of file?

A) Read-only B) Encrypted
C) Password protected D) Archived

A

Computer Science & Information Technology

You might also like to view...

Bookmark names should briefly describe their ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Cookies and key loggers are examples of ____________

a. Viruses b. Worms c. Spyware d. None of the above

Computer Science & Information Technology