In order to import content from a Word file for slides, the Word file needs to use ________
A) columns B) bolding C) tabs D) heading levels
D
Computer Science & Information Technology
You might also like to view...
Your SLAs should limit the number of nested disasters to ________
A) No limit B) 10 C) 2 D) 5
Computer Science & Information Technology
Public key encryption is also called ____________________ encryption.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology