The rule that allows you to set a condition so that specific text is inserted if the condition is met, and different text is inserted if the condition is not satisfied is:

a. Fill-in
b. If…Then…Else
c. Ask

B

Computer Science & Information Technology

You might also like to view...

________ show the relationship between active and related cells

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match each item with a statement below.

A. A server role that works with client applications that can take advantage of RMS safeguards. B. A relatively new encryption standard adopted by the U.S. government to replace DES and 3DES and that employs a private-key block-cipher form of encryption. C. A security measure for protecting hard drives in Windows 7, 8/8.1, and 10 as well as in Windows Server 2016. It can use a TPM chip on a computer or a flash drive with a PIN to enforce security. See Trusted Platform Module (TPM). D. A set of policies that govern security, configuration, and a wide range of other settings for objects within containers in Active Directory. E. A set of IP-based secure communications and encryption standards created through the Internet Engineering Task Force (IETF). F. A security system developed by the Massachusetts Institute of Technology to enable two parties on an open network to communicate without interception from an intruder, by creating a unique encryption key for each communication session. G. A Windows Server 2016 tool that enables you to produce reports about proposed or current Group Policy settings for the purpose of planning and troubleshooting when multiple Group Policies are in use (such as for OUs and domains). H. Security rights developed by Microsoft to provide security for documents, spreadsheets, email, and other types of files created by applications. I. In Kerberos security, a permanent ticket good for the duration of a logon session (or for another period of time specified by the server administrator in the account policies) that enables the computer to access network services beginning with the Logon service. J. Enables software and device installations in standard user mode while still ensuring authorization from the administrator.

Computer Science & Information Technology