The ________ command changes a document to a Read-Only status

A) Mark as Final
B) Encrypt with Password
C) Restrict Editing
D) Add a Digital Signature

A

Computer Science & Information Technology

You might also like to view...

Outsiders might try to infect your system through all of the following, EXCEPT ________

A) contaminated USB drives B) e-mail messages C) Bluetooth pairing D) Internet downloads

Computer Science & Information Technology

Data in one or more tables can be related to each other by means of a(n) ________ field

Fill in the blank(s) with correct word

Computer Science & Information Technology