In order to import content from a Word file for slides, the Word file needs to use ________

A) columns B) bolding C) tabs D) heading levels

D

Computer Science & Information Technology

You might also like to view...

Your SLAs should limit the number of nested disasters to ________

A) No limit B) 10 C) 2 D) 5

Computer Science & Information Technology

Public key encryption is also called ____________________ encryption.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology