A protected sheet can always be unprotected, but you can also require users to enter a(n) ____________________ before the protection is removed.

Fill in the blank(s) with the appropriate word(s).


password

Computer Science & Information Technology

You might also like to view...

When designing your own on-screen form using the Form Wizard, first click the ____ tab.

A. CREATE B. HOME C. EXTERNAL DATA D. DATABASE TOOLS

Computer Science & Information Technology

A distributed denial-of-service attack is ________.

a) an attack in which requests are sent from multiple sources to overload a system. b) an attack on a distributed system that overloads its network communications. c) a means to counteract the security provided by a firewall. d) none of the above

Computer Science & Information Technology

Give some additional views that may be needed by other user groups for the database shown in Figure 1.2.

What will be an ideal response?

Computer Science & Information Technology

When a keyframe has a small ____ on it, this indicates that it contains ActionScript.

A. red bullet B. % C. a D. !

Computer Science & Information Technology