1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
3 years ago
7

Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has

created, while allowing users to add comments about it. What sequence of commands should she click?
File, Permissions, Encrypt with a Password, then enter her password

File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

File, Permissions, Formatting Restrictions, Comments, Start Enforcement

File, Save As, Encrypt with a Password, then enter her password
Computers and Technology
2 answers:
jonny [76]3 years ago
8 0
Id say (B) File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

However much you may want your reviewers to make comments and suggest changes in a document, there may be times when you want to restrict them from changing the content you have created. To restrict formatting in a document, you can click restrict formatting in the protect section of the review tab and follow the procedure in the answer above.


Rasek [7]3 years ago
8 0
<span>File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password is the answer</span>
You might be interested in
Assign decoded_tweet with user_tweet, replacing any occurrence of 'TTYL' with 'talk to you later'. Sample output with input: 'Go
nekit [7.7K]

Answer:

I am going to use the Python programming language to answer this. The source code is given below:

print("Enter your tweet here")

user_tweet = input()

decoded_tweet = user_tweet.replace('TTYL', 'talk to you later')

print("This is the decoded tweet: ")

print(decoded_tweet)

Explanation:

In the program the replace() module was used to replace 'TTYL' with 'talk to you later.'

Attached is the screenshot of the output.

8 0
3 years ago
Read 2 more answers
Identify 3 distractions for young drivers and explain how you plan to minimize these distractions.
Rom4ik [11]
1 distraction is phones , texting and driving . They could have a system in their car which activated by a voice assistant who could do it al for them
4 0
3 years ago
a new client has indicated that they are exercising due to advice from their physician, but they are generally amotivated. what
Orlov [11]

The factor that is a best choice for the personal trainer in their initial meeting is option a: Inquire further about what their motives are for participating.

<h3>What are the motives in motivation?</h3>

Psychologists is known to have shared motives into three types which are:

  • Biological motives
  • Social motives
  • Personal motives.

Note that the goal that is to be meant is for the fulfillment of  the client want or their  need.

Therefore asking the right question will go a long way in satisfying them. So, The factor that is a best choice for the personal trainer in their initial meeting is option a: Inquire further about what their motives are for participating.

Learn more about personal trainer from

brainly.com/question/19462080
#SPJ1

A new client has indicated that they are exercising due to advice from their physician, but they are generally amotivated. What would be the best choice for the personal trainer in their initial meeting?

Inquire further about what their motives are for participating.

Create a plan for overcoming barriers.

Establish short- and long-term goals.

Start establishing an emotional support system.

5 0
2 years ago
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. True False
Gelneren [198K]

Answer:

False

Explanation:

8 0
3 years ago
A ____ is a software program written to change the behavior of a computer or other device on a network, without the permission o
Tems11 [23]
Security filter app that filters the accessibility of things it deems inappropriate
5 0
3 years ago
Other questions:
  • You are able to change the formatting of a table after it is inserted into a placeholder. True or false
    9·2 answers
  • Which file extension indicates that a file is an Adobe Acrobat document?
    13·1 answer
  • How to transfer photos from iphone to iphone?
    14·2 answers
  • Which two sentences uses the colon correctly?
    13·1 answer
  • What laptops can you get for 2500$ and should mostly using Microsoft applications.
    14·2 answers
  • Help me out with this .....
    10·1 answer
  • Which component is a part of the CPU of a computer
    12·2 answers
  • Select the correct answer from each drop-down menu. Look at Marta's email signature and fill in the missing elements. Marta D'Ab
    14·2 answers
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • How do you add Rulers to a document?: *
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!