By scrambling the contents of a file, you can restrict access to the file by using ________

A) Encryption B) Windows Live ID C) Cloud Computing D) Mark as Final

A

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about the message to enable editing or enable content?

a. You might encounter these security features if you open a file from an e-mail or download files from the Internet. b. In Office 2010, some files open in Private View if the file appears to be from a potentially risky location, such as the Internet. c. These options are new security features in Office 2010 that protect your computer from malicious files by opening them in a restricted environment until you enable them. d. Trusted Documents is another security feature that remembers which files you have already enabled.

Computer Science & Information Technology

If the user starts more than one Office application at once, each program appears in its own ________

Fill in the blank(s) with correct word

Computer Science & Information Technology