PowerPoint presentations are saved with a _____ file extension.
A. .pptx
B. .ppt
C. .ptpx
D. .ppxt
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT considered an objective in ensuring probative information is recovered?
A) To protect the computer system during the actual investigation B) To determine if steganography was used C) To recover deleted, existing, hidden, and password protected files D) To search for any and all malware that may have infected the system
Computer Science & Information Technology
Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?
A. Content filter B. Proxy server C. Layer 3 switch D. Firewall
Computer Science & Information Technology