You can only use the font sizes available in the Font Size drop-down list
Indicate whether the statement is true or false
FALSE
Computer Science & Information Technology
You might also like to view...
Backups can be used to protect which of the following?
A. Confidentiality B. Integrity C. Availability D. Auditing
Computer Science & Information Technology
Access to high-speed broadband communication lines can be accomplished by using a ___________.
a. cable modem b. DSL connection c. either B or C d. neither B nor C
Computer Science & Information Technology