When a file is pasted into the PowerPoint presentation, the presentation is referred to as the ________

A) table B) source file C) bar chart D) destination file

D

Computer Science & Information Technology

You might also like to view...

Which code example is the correct way to create a link?

A) Contact US B) Contact US C) Contact US D) Contact US

Computer Science & Information Technology

Which of the following worms exploits systems running Microsoft SQL Server Desktop Engine?

a. Flame b. MyDoom c. Slammer d. FakeAV

Computer Science & Information Technology