1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
6

Mateo has received a Word document from a customer that contains private information and is secured with a password. However, wh

en Mateo tries to open the
document in his browser, he gets an error message. How might he fix this problem?
a Use a secure website that starts with HTTPS
b. Open the document in the Word app installed on his computer
c Save the document in the cloud
d Ensure there's a lock icon in the browser
Computers and Technology
2 answers:
natali 33 [55]3 years ago
6 0

Answer:

open it in a different app

Explanation:

Lana71 [14]3 years ago
5 0
I think B is the answer
You might be interested in
Which best describes inserting a table using the Table Gallery
balandron [24]
The table gallery is to help you create the table.
4 0
3 years ago
Read 2 more answers
Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropb
Paha777 [63]

The difference is that Dropbox  offers just 2 GB free storage space while  Microsoft's OneDrive gives 5 GB in terms of free storage space.

<h3>What is Microsoft OneDrive?</h3>

This  is known to be a file hosting software and it also does synchronization service given by Microsoft.

Some other  fundamental difference between Dropbox and OneDrive in terms of  Business is that Dropbox is known to often give unlimited storage for about $20 to paid user/month while OneDrive is said to only give unlimited storage for $10 per paid user/month.

Learn more about Dropbox from

brainly.com/question/20935392

5 0
2 years ago
Which type of software-generated problems can indicate that a software bug is causing a memory error?
Katena32 [7]
The type of software-generated problems that can indicate that a software bug is causing a memory error are page fault, exception error and general-protection fault. Registry errors show that there are parts of the registry that were written to the faulty parts of the RAM. An erroneous memory count would happen when there is incompatibility in the installation.
3 0
3 years ago
Why should a user preview the document before printing?​
Margarita [4]
The user should preview a document first to make sure the layout is correct, so as not to waste paper if a font size or layout is incorrect.
5 0
3 years ago
Read 2 more answers
What are the Database used in RDBMS and DBMS<br>please answer immediately​
frosja888 [35]

Answer:

The best example for the DBMS is certainly the Microsoft Access. And various examples of RDBMS are MySQL, Sql Server, Amazon DynamoDB and so on. However, its essential to understand the difference between the RDBMS and the DBMS. The main difference between the two is certainly that in the RDBMS the application stores the data in tabular manner, and DBMS the data is stored as files. In the RDBMS the tables comes with identifier known as primary key, and the data values are being saved in the form of tables.

Explanation:

Please check the answer section.

4 0
3 years ago
Other questions:
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • IF YOU KNOW THE ANSWER TO THIS PLEASE ANSWER ASAP
    12·1 answer
  • Processing is handled by the computer’s central processing unit (cpu).​ <br> a. True <br> b. False
    6·1 answer
  • How to fix Please enable JS and disable any ad blocker
    13·2 answers
  • These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th
    9·1 answer
  • You want to create Web pages that can easily adapt to and serve multimedia content to smartphones, tablets, gaming devices and s
    13·1 answer
  • In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the execut
    5·1 answer
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!