Which of the following is not true about restricting access when collaborating?
A) The Restrict Access feature is located on the File tab, in the Info section, under Protect Presentation.
B) It is a good idea to use the PowerPoint Restrict Access feature.
C) Sharing your presentation with others from a shared folder can lead to unauthorized changes made to your presentation.
D) To use this feature, your computer will need to be set up for Information Restrict Management though Microsoft Office.
D
You might also like to view...
Which of the following statements is false?
a. The descriptive statistics mean, median and mode are measures of central tendency—each is a way of producing a single value that is in some sense typical of the others. b. The following session creates a list called grades, then uses the built-in sum and len functions to calculate the median “by hand”—sum calculates the total of the grades (397) and len returns the number of grades (5): In [1]: grades = [85, 93, 45, 89, 85] In [2]: sum(grades) / len(grades) Out[2]: 79.4 c. Like functions min and max, sum and len are both examples of functional-style programming reductions—they reduce a collection of values to a single value. d. The Python Standard Library’s statistics module provides functions for calcu-lating the mean, median and mode—these, too, are reductions.
SQL is an imperative programming language.
Answer the following statement true (T) or false (F)
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
A. WWW B. TCP C. FTP D. HTTP
A ____ is a path consisting of at least three vertices that starts and ends with the same vertex.
A. cycle B. loop C. round D. circle