Once the changes are recorded, you can review the shared file and decide to ________

A) accept or reject the changes B) delete the file
C) refresh the changes D) discard the file


A

Computer Science & Information Technology

You might also like to view...

The statement Declare MyArray[8,6] allocates __________ consecutive storage locations in the computer’s internal memory.

Fill in the blank(s) with correct word

Computer Science & Information Technology

What two types of organization are essential to effective Web navigation?

What will be an ideal response?

Computer Science & Information Technology

?Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

A. ?Messages from the IDS are routed to the network security team B. ?The IDS warns the firewall of suspicious traffic C. The network router sends traffic to the firewall as well as to the IDS D. Network security team decides to block traffic from that IP address

Computer Science & Information Technology

What are the guidelines to keep in mind before you use links to create connections from one document to another on your website or within a document?

What will be an ideal response?

Computer Science & Information Technology