In the Restrict Editing pane, when you click Yes, Start Enforcing Protection, ________ displays

A) the Start Enforcing Protection dialog box
B) the open document
C) a new document
D) the Password dialog box

A

Computer Science & Information Technology

You might also like to view...

In Excel 2013 a dataset:

A) is a grouping of worksheets with similar content. B) is a grouping of similarly formatted worksheets. C) indicates where data starts on a new printed page. D) is a collection of structured, related data in columns and rows.

Computer Science & Information Technology

Which of the following statements about buffer overflow attacks is true?

a. Buffer overflow attacks are easy to execute. b. Perfectly written programs are not susceptible to buffer overflow attacks. c. Buffer overflow attacks target systems' availability. d. Buffer overflow attacks target computer hardware.

Computer Science & Information Technology