The top-level heading of a Word outline becomes the slide title; each subsequent level becomes a(n) ________ under the top heading level or a subpoint under the next level
Fill in the blank(s) with correct word
bullet point
Computer Science & Information Technology
You might also like to view...
Using a trusted channel and link encryption are both ways to prevent what type of access control attack?
A. Brute force B. Spoofed login screens C. Man-in-the-middle attacks D. Dictionary attacks
Computer Science & Information Technology
The _________ control strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.
A. termination B. defense C. transference D. acceptance
Computer Science & Information Technology