Case PPT 7-1Amber is an assistant in the human resources department of a large company. She often works with documents and presentations that contain sensitive employee information. She is currently working on a presentation that is part of a package used to recruit top-level executives. Which command should Amber use to password-protect the presentation?

A. Add a Digital Signature
B. Insert Comment
C. Encrypt with Password
D. Mark as Final


Answer: C

Computer Science & Information Technology

You might also like to view...

When a graphic is selected in the Property inspector, the ____________________ text box provides a list of the CSS Class styles you created that you can apply to a selected graphic.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Why are evolutionary models considered by many to be the best approach to software development in a modern context?

What will be an ideal response?

Computer Science & Information Technology

An example of an "empty" or one-sided tag is:

a.
b.


c. d. all of the above

Computer Science & Information Technology

The example near the top of Sobell, page 486, demonstrates a way to put a variable in the environment of a script you are calling without declaring the variable in the interactive shell you are running. Use this technique to assign a value to myvar, place it in the environment of echomyvar, and run echo- myvar. After running the script, is myvar set in the interactive shell?

What will be an ideal response?

Computer Science & Information Technology