The top-level heading of a Word outline becomes the slide title; each subsequent level becomes a(n) ________ under the top heading level or a subpoint under the next level

Fill in the blank(s) with correct word

bullet point

Computer Science & Information Technology

You might also like to view...

Using a trusted channel and link encryption are both ways to prevent what type of access control attack?

A. Brute force B. Spoofed login screens C. Man-in-the-middle attacks D. Dictionary attacks

Computer Science & Information Technology

The _________ control strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.

A. termination B. defense C. transference D. acceptance

Computer Science & Information Technology