If you password ________ a document, other users must know the password to open the document

Fill in the blank(s) with correct word


protect

Computer Science & Information Technology

You might also like to view...

Primitive type values are stored within the variable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called _____.

A. current approaches B. streamlined processes C. best practices D. process improvements

Computer Science & Information Technology

Dan is a good, but not great, chess player. Based on past tournament experience, his chances of winning any single game are . What is the probability that he will lose all five games?

A.
B.
C.
D.
E.

Computer Science & Information Technology

A(n) ____ is a Java program that can be downloaded from a Web site as part of a Web page, that runs in a Web browser.

A. applet B. cookie C. robot D. crawler

Computer Science & Information Technology