Which of the following is not an issue the Word macro security evaluates with regard to digital signatures?

A) They must be dated.
B) They must be valid.
C) They must be unexpired.
D) They must be signed by a trusted publisher.


A

Computer Science & Information Technology

You might also like to view...

Typically, __________ statements are used for counter-controlled iteration and ___________ statements for sentinel-controlled iteration.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?In implied Boolean logic, symbols are used to represent Boolean operators, such as a plus sign (+) for AND, and a minus sign (-) for NOT.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To transfer data packets between two networks, a ________ is used.

A. router B. hub C. firewall D. switch

Computer Science & Information Technology

Most ink jet printers use _____ color.

A. RGB B. CMYB C. RGBK D. CMYK

Computer Science & Information Technology