Match the following permission levels to their meaning:

I. Full control
II. Design
III. Contribute
IV. Read
V. Limited Access

A. View, add, update, and delete list items and documents
B. View, add, update, delete, and customize content; override list behaviors; approve items.
C. View pages and list items, and download documents
D. View specific application pages
E. Can do everything to all content, design, and permissions; override list behaviors; approve items.


E, B, A, C, D

Computer Science & Information Technology

You might also like to view...

If Sensor_1 Then;

Fill in the blank(s) with the appropriate word(s). What is wrong with each of the following lines of code?

Computer Science & Information Technology

A(n) ________ is a shape that has a line and is often filled with text and is often used in cartooning

Fill in the blank(s) with correct word

Computer Science & Information Technology

Joining a table to itself, is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If a CA creates a certificate that is signed by its own private key, it is commonly known as a(n) ____.

A. intermediate CA B. self-signed CA C. mid-level CA D. domain CA

Computer Science & Information Technology