The word ________ in the Approval Status column of a SharePoint document library indicates that a document has been submitted for approval

A) Approval Waiting B) Pending C) Submitted D) Approved


B

Computer Science & Information Technology

You might also like to view...

After you select a template from the list of thumbnail templates, you may upload the template to your computer so that you can use it

Indicate whether the statement is true or false

Computer Science & Information Technology

In an If...Then statement, the ____ symbol is used to test for inequality.

A. >< B. != C. = = D. <>

Computer Science & Information Technology

A(n) _____ does not distract a user and calls no attention to itself.

A. transparent interface B. translucent interface C. opaque interface D. pellucid interface

Computer Science & Information Technology

What specific things can an attacker do if he or she takes over a router?

A. The attacker can'r do anything to harm the network. B. The attacker can re-route traffic or reconfigure the router to cause a local DoS C. The attacker can effectively map the entire internal network. D. The attacker can effectively map the entire internal network and re-route traffic or reconfigure the router to cause a local DoS.

Computer Science & Information Technology