A presentation's security can be enhanced by changing its ________

A) properties B) timings C) password D) slide order

C

Computer Science & Information Technology

You might also like to view...

What is the final stage of the Software Capability Maturity Model (SW-CMM)?

A. Repeatable B. Defined C. Managed D. Optimizing

Computer Science & Information Technology

A loop that accumulates a total as it reads each number from a series is often said to keep a(n) __________.

a. average b. maximum value c. running total d. accumulation

Computer Science & Information Technology