You can save a PowerPoint presentation in outline format with a(n) ____ extension and then open the file in Word.

A. .docx
B. .rtf
C. .txt
D. .pdf

Answer: B

Computer Science & Information Technology

You might also like to view...

Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as DNS spoofing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.

A. Network B. Device C. Setup D. Hardware

Computer Science & Information Technology