The ________ command changes a document to a Read-Only status
A) Mark as Final
B) Encrypt with Password
C) Restrict Editing
D) Add a Digital Signature
A
Computer Science & Information Technology
You might also like to view...
Outsiders might try to infect your system through all of the following, EXCEPT ________
A) contaminated USB drives B) e-mail messages C) Bluetooth pairing D) Internet downloads
Computer Science & Information Technology
Data in one or more tables can be related to each other by means of a(n) ________ field
Fill in the blank(s) with correct word
Computer Science & Information Technology