After you click the Yes, Start Enforcing Protection button to restrict editing,:

A) you are prompted for a password.
B) the form is officially protected.
C) the tools on the Developer tab are grayed out.
D) the form cannot be accessed by unauthorized users.


A

Computer Science & Information Technology

You might also like to view...

A visual indication of the status of a task such as download or a file transfer is called a(n):

A) toolbar. B) status bar. C) address bar. D) progress bar.

Computer Science & Information Technology

When you decide to create an outline in Word to use as the basis for a PowerPoint presentation, how should you proceed?

What will be an ideal response?

Computer Science & Information Technology

Memory modules are susceptible to _______, which is where you could induce current that weakens or destroys the module

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are two characteristics of liquid crystals in laptop displays? (Select two.)

A) Sensitive to light B) Heavier than tap water C) Block some of the "always" on light D) Cannot be used in displays over 19" wide E) Used to direct the beam of light to the front of the display

Computer Science & Information Technology