When you download a file and Office 2016 considers the source location of the file to be risky, it will automatically open the file in ________ View

A) Save B) Restricted C) Protected D) Lock


C

Computer Science & Information Technology

You might also like to view...

Event method________changes the value of the internal flag to false.

a) delete. b) clear. c) setFalse. d) None of the above.

Computer Science & Information Technology

A hard disk must be ________ before it can be used to store data

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following statements is true about the search capabilities in Windows Vista?

A) Any search can be saved. B) A search cannot be saved. C) Search is a slow function. D) You may only search in one way.

Computer Science & Information Technology

________ entails investigating the IT security of external companies and the implications of close IT partnerships before implementing interconnectivity.

A. Auditing B. Vulnerability testing C. Peer-to-peer security D. Due diligence

Computer Science & Information Technology