Case WDX 1-1Sharon is working on a sensitive company document and needs to make sure only authorized personnel can view or make changes to the document. Sharon wants to use Information Rights Management to restrict access to the document. Which command on the Protect Document button menu should she use?
A. Mark as Final
B. Encrypt with Password
C. Restrict Permission by People
D. Restrict Editing
Answer: C
Computer Science & Information Technology
You might also like to view...
STDEV.P should be used to calculate standard deviation when all data for a population is present
Indicate whether the statement is true or false
Computer Science & Information Technology
Describe an easy way to tell whether an icon is a shortcut
A) If the icon says shortcut in the corner B) If the icon has an arrow through the icon C) If the icon has a bent arrow in the corner D) If the icon has a map
Computer Science & Information Technology
The process of managing a database is called database ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Using CMYK inks only, it is possible to reproduce a color photo.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology