PowerPoint presentations are saved with a _____ file extension.

A. .pptx
B. .ppt
C. .ptpx
D. .ppxt

Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT considered an objective in ensuring probative information is recovered?

A) To protect the computer system during the actual investigation B) To determine if steganography was used C) To recover deleted, existing, hidden, and password protected files D) To search for any and all malware that may have infected the system

Computer Science & Information Technology

Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?

A. Content filter B. Proxy server C. Layer 3 switch D. Firewall

Computer Science & Information Technology