If a document is ________ protected, the file is restricted to anyone who does not have the log in credentials

A) read-only

B) modification

C) password

D) virus


C

Computer Science & Information Technology

You might also like to view...

Select all that apply. A program accepts a user's password. It must be between 4 and 12 characters long, must include at least one uppercase character, and should contain at least one number. Which of the following validation options should be included?

a. that there are at least 4 characters b. that the password makes sense c. that there is at least one uppercase character d. that there is only one number e. that there is at least one number f. that there is only one uppercase character g. that there are no more than 12 characters

Computer Science & Information Technology

The contents of the variables (elements) in an array cannot be displayed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Parallel processing is a method used by a single processor to improve performance

Indicate whether the statement is true or false

Computer Science & Information Technology

Working with others is also known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology