If a document is ________ protected, the file is restricted to anyone who does not have the log in credentials

A) read-only

B) modification

C) password

D) virus

C

Computer Science & Information Technology

You might also like to view...

Define plagiarism

What will be an ideal response?

Computer Science & Information Technology

The most popular port scanner in the hacking and security community is ________

a. Portscan b. Nmap c. Servport d. NetBIOS

Computer Science & Information Technology