Case WDX 1-1Sharon is working on a sensitive company document and needs to make sure only authorized personnel can view or make changes to the document. Sharon wants to allow a few people to read the document, but wants no one to be able to make changes. Where can she do that?

A. Signature Setup dialog box
B. Encrypt Document dialog box
C. Word Options dialog box
D. Restrict Formatting and Editing task pane


Answer: D

Computer Science & Information Technology

You might also like to view...

A friend function needs to be passed an object of the class. If the friend only needs to access the object, but not change its data members, then the object should be passed as _______________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. As with Playfair, the strength of the Hill cipher is that it completely hides single letter frequencies. 2. A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext. 3. The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security. 4. The most widely used cipher is the Data Encryption Standard. 5. Steganography renders the message unintelligible to outsiders by various transformations of the text.

Computer Science & Information Technology

Action queries ________ modify the data in tables. Because there is no undo feature for action queries, it is important to be cautious when running any action query

Fill in the blank(s) with correct word

Computer Science & Information Technology

Hyperlinks are only active in InDesign documents that have been exported as Adobe ____ or ____ files.

A. SPF, TWD B. PDF, SWF C. SPD, STP D. INND, PDF

Computer Science & Information Technology