You can save a PowerPoint presentation in outline format with a(n) ____ extension and then open the file in Word.
A. .docx
B. .rtf
C. .txt
D. .pdf
Answer: B
Computer Science & Information Technology
You might also like to view...
Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as DNS spoofing.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.
A. Network B. Device C. Setup D. Hardware
Computer Science & Information Technology