?If a notebook contains sensitive material, you can __________. 

Fill in the blank(s) with the appropriate word(s).


password-protect some or all of the notebook so that only certain people can open it.

Computer Science & Information Technology

You might also like to view...

Ccan be thought of as the inputs and outputs we use to accomplish the tasks in a step.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A symbol that specifies the mathematical operation, such as subtraction, is a(n) ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The version of Windows 8.1 that does not have the capability to run all apps created for Windows 8.1 is ________

a. Windows RT 8.1 b. Windows 8.1 c. Windows 8.1 Pro d. Windows 8.1 Enterprise

Computer Science & Information Technology

What two technologies below are fully-implemented, 64-bit processors for use in servers and workstations?

A. Itanium B. Centrino C. Xeon D. Core i7

Computer Science & Information Technology