In SharePoint, a(n) ________ workflow is used to track items in a list or library

A) custom B) disposition approval
C) InfoPaths D) three-state


D

Computer Science & Information Technology

You might also like to view...

Data import options are listed on Access's IMPORT/EXPORT DATA tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To hide or show gridlines in a worksheet, you click Gridlines in the:

A) Workbook Views group on the VIEW tab. B) Show group on the VIEW tab. C) Workbook Views group on the HOME tab. D) Show group on the HOME tab.

Computer Science & Information Technology

Although a web enabled application appears to only allow letters in the comment field of a web form, malicious user was able to carry a SQL injection attack by sending special characters through the web comment field.Which of the following has the application programmer failed to implement?

A. Revision control system B. Client side exception handling C. Server side validation D. Server hardening

Computer Science & Information Technology

The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security posture. Which of the following security techniques is MOST appropriate to do this?

A. Log audits B. System hardening C. Use IPS/IDS D. Continuous security monitoring

Computer Science & Information Technology