A presentation's security can be enhanced by changing its ________
A) properties B) timings C) password D) slide order
C
Computer Science & Information Technology
You might also like to view...
What is the final stage of the Software Capability Maturity Model (SW-CMM)?
A. Repeatable B. Defined C. Managed D. Optimizing
Computer Science & Information Technology
A loop that accumulates a total as it reads each number from a series is often said to keep a(n) __________.
a. average b. maximum value c. running total d. accumulation
Computer Science & Information Technology