When a ________ is assigned, only those who know it will be able to make changes to the document

A) restriction
B) protection
C) form
D) password


D

Computer Science & Information Technology

You might also like to view...

Every JComponent has an instance variable called that enables the object to maintain references to all its registered listeners.

a. registeredListenerList b. listenerList c. registeredList d. eventListenerList

Computer Science & Information Technology

If the dialog between user and program is as follows, give the rest of the dialog. (Here, means the user presses the return key.) Explain the results.

Assume the following code fragment is executed while embedded in a complete, correct program. What will be an ideal response? ``` char c1, c2, c3, c4; cout << "Enter a line of input \n"; cin.get(c1); cin.get(c2); cin.get(c3); cin.get(c4); cout<< c1 << c2 << c3 << c4 << "END OF OUTPUT"; cout << endl; ``` ``` Enter a line of input abc ```

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 1-1Alice was working on her company's Web site and had problems with inserting some images. Some of them were distorted; some were too big, so downloads took a long time. She asked her friend Sam for advice, checking in with him for answers to her questions.Which of the following image files is not compressed?

A. JPEG B. GIF C. BMP D. PNG

Computer Science & Information Technology

Authenticationis asecurity measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology