To ensure that recipients cannot edit a document, save it as a(n) ________ document

A) write-protected

B) edit-protected

C) read-only

D) reading mode


C

Computer Science & Information Technology

You might also like to view...

Describe anycasting and explain how an anycast address is located?

What will be an ideal response?

Computer Science & Information Technology

To design a recursive function, you must determine the limiting conditions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Software that detects and eliminates malicious code is called a(n) ____ app. ?

A. ?sniffer B. ?antivirus C. ?cracker D. ?watchdog

Computer Science & Information Technology

What are typical slugs?

What will be an ideal response?

Computer Science & Information Technology