You can protect your documents from unauthorized access using _____.

A. encryption
B. formatting restrictions
C. editing restrictions
D. all of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

Showthat the algorithm for concurrently accessing a B+tree in which operations that only search the tree use lock coupling and operations that modify the tree handle write latches in a two-phase fashion guarantees that all operations are carried out successfully.

What will be an ideal response?

Computer Science & Information Technology

Software designed specifically for managing real estate is an example of ________ software

A) e-commerce B) vertical market C) project management D) general business

Computer Science & Information Technology

Flash Fill involves more typing than traditional text functions and can be more difficult to use on touch-enabled devices

Indicate whether the statement is true or false.

Computer Science & Information Technology

A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.

A. procedural language B. query by example language C. query language D. imperative language

Computer Science & Information Technology