Jian coordinates continuing education programs for pediatric nurses, and he has created a form that he will e-mail to the Pediatric Nurses Alliance to ask for feedback at the end of the course. Before he sends the form, he wants to make sure that the students are not able to make any changes to the structure of the form.
After protecting the form, Jian decides to make some changes to the structure of the form. How would he do this?

What will be an ideal response?


Jian needs to unprotect the form. He would click the Restrict Editing button in the Protect group, click Stop Protection, then enter the correct password. He can now make changes to the structure of the form, then protect the form again.

Computer Science & Information Technology

You might also like to view...

Which is not a typical application of queues?

a. Routing packets in a computer network. b. File server handling file access requests from many clients. c. High-speed sorting. d. Print spooling.

Computer Science & Information Technology

Currently, ____ percent of U.S. mobile Web users are mobile-only, meaning that they rarely access the Web via desktop computer.

A. 6 percent B. 11 percent C. 25 percent D. 62 percent

Computer Science & Information Technology

Which security project team role is filled by individuals who understand the organizational culture, existing policies, and requirements for developing and implementing successful policies?

A. Security policy developers B. Risk assessment specialists C. Security professionals D. Team leader

Computer Science & Information Technology

? In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group.

A. dialog box B. list box C. text box D. check box

Computer Science & Information Technology