When a file is pasted into the PowerPoint presentation, the presentation is referred to as the ________
A) table B) source file C) bar chart D) destination file
D
Computer Science & Information Technology
You might also like to view...
Which code example is the correct way to create a link?
A) Contact US B) Contact US C) Contact US D) Contact US
Computer Science & Information Technology
Which of the following worms exploits systems running Microsoft SQL Server Desktop Engine?
a. Flame b. MyDoom c. Slammer d. FakeAV
Computer Science & Information Technology