You can only use the font sizes available in the Font Size drop-down list

Indicate whether the statement is true or false

FALSE

Computer Science & Information Technology

You might also like to view...

Backups can be used to protect which of the following?

A. Confidentiality B. Integrity C. Availability D. Auditing

Computer Science & Information Technology

Access to high-speed broadband communication lines can be accomplished by using a ___________.

a. cable modem b. DSL connection c. either B or C d. neither B nor C

Computer Science & Information Technology