When you download a file and Office 2016 considers the source location of the file to be risky, it will automatically open the file in ________ View
A) Save B) Restricted C) Protected D) Lock
C
Computer Science & Information Technology
You might also like to view...
Event method________changes the value of the internal flag to false.
a) delete. b) clear. c) setFalse. d) None of the above.
Computer Science & Information Technology
A hard disk must be ________ before it can be used to store data
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following statements is true about the search capabilities in Windows Vista?
A) Any search can be saved. B) A search cannot be saved. C) Search is a slow function. D) You may only search in one way.
Computer Science & Information Technology
________ entails investigating the IT security of external companies and the implications of close IT partnerships before implementing interconnectivity.
A. Auditing B. Vulnerability testing C. Peer-to-peer security D. Due diligence
Computer Science & Information Technology