To ensure that recipients cannot edit a document, save it as a(n) ________ document
A) write-protected
B) edit-protected
C) read-only
D) reading mode
C
Computer Science & Information Technology
You might also like to view...
Describe anycasting and explain how an anycast address is located?
What will be an ideal response?
Computer Science & Information Technology
To design a recursive function, you must determine the limiting conditions.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Software that detects and eliminates malicious code is called a(n) ____ app. ?
A. ?sniffer B. ?antivirus C. ?cracker D. ?watchdog
Computer Science & Information Technology
What are typical slugs?
What will be an ideal response?
Computer Science & Information Technology