
Sample file: How to zoom in on small details in PowerPoint
This is the demonstration file to accompany the article, How to zoom in on small details in PowerPoint, by Susan Harkins.
TechRepublic's Resource Library is the place to get free tech downloads in a variety of formats, including PDF versions of popular articles, "10 things" lists, sample chapters from technology books, "How do I..." problem-solving guides, cheat sheets for knocking out IT tasks, keyboard shortcuts, glossaries, career pointers and collections of tips and techniques that focus on critical topics.
This is the demonstration file to accompany the article, How to zoom in on small details in PowerPoint, by Susan Harkins.
This is the demonstration file to accompany the article, How to use the many text wrapping options in Microsoft Word, by Susan Harkins.
Access security for everyone, from any device, anywhere. For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero-trust security platform for all users, devices, and applications. With Duo you can confirm user identities in a snap, monitor the health of managed and unmanaged devices, set adaptive security ...
This is the demonstration file to accompany the article, How to extract the date and time from a serial date in Excel, by Susan Harkins.
The digital estate has changed. We changed with it. The M365 platform enables modern management for enterprises whether they are cloud-only, hybrid-cloud, and mostly on-prem. By moving most or all productivity and security workloads to the cloud, over time, new avenues open up – like this cost-effective DaaS management program. Download now to learn more!
How do you secure all remote devices and protect employees from becoming targets of opportunity? How do you eliminate the risk of “Shadow IT” and reduce the need for employees to find their own “cool tools” or third-party applications? How do you adjust to the unprecedented stress on IT infrastructure and protect critical or sensitive ...
As a leading provider of IT services, we would like to meet with your team and provide a no-obligation network and security assessment of your computer network and business technology. Contact us today for more information or to schedule your assessment!
This is the demonstration file to accompany the article, How to limit the number of characters in a search and replace only a specific character in Word, by Susan Harkins.
This is the demonstration file to accompany the article, How to subtotal transactions by conditional date components in Excel, by Susan Harkins.
This is the demonstration file to accompany the article, Two ways to quickly delete paragraphs in Microsoft Word, by Susan Harkins.