1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
3 years ago
7

Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has

created, while allowing users to add comments about it. What sequence of commands should she click?
File, Permissions, Encrypt with a Password, then enter her password

File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

File, Permissions, Formatting Restrictions, Comments, Start Enforcement

File, Save As, Encrypt with a Password, then enter her password
Computers and Technology
2 answers:
jonny [76]3 years ago
8 0
Id say (B) File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

However much you may want your reviewers to make comments and suggest changes in a document, there may be times when you want to restrict them from changing the content you have created. To restrict formatting in a document, you can click restrict formatting in the protect section of the review tab and follow the procedure in the answer above.


Rasek [7]3 years ago
8 0
<span>File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password is the answer</span>
You might be interested in
When we insert a new node into a red-black tree, we set the color of the newly inserted node n to red. observe that if we had ch
Vika [28.1K]
Cause u didnt want to
4 0
4 years ago
It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu
s2008m [1.1K]

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

7 0
3 years ago
What type of user account should Tuan’s brother use?
Sauron [17]

Answer:

d so if he comes back any time soon

Explanation:

6 0
4 years ago
Who is mostly affected by computer viruses?
Komok [63]
People who use Windows OS.
3 0
3 years ago
Array Challenge Have the function ArrayChallenge (arr) take the array of numbers stored in arr and return the string true if any
vampirchik [111]

Answer:

The code is given as follows,

Explanation:

Code:

#include <stdio.h>

#include <string.h>  

int n; //to store size of array  

char* ArrayChallenge(int arr[]) //function returns string true or false

{

  int i, j;

  int sum = 0;

  for(i = 0; i < n; i++)

  {

      sum = sum + arr[i]; //count sum

  }  

  for(i = 0; i < n; i++)

  {

      for(j = i+1; j < n; j++) //loop for every two elements in array

      {

          if(arr[i]*arr[j] > 2*sum) //check if proudct of two elements > 2 times sum

          {

              printf("\n%d x %d = %d, 2xSum = %d\n", arr[i], arr[j], arr[i]*arr[j], 2*sum);

              return "true"; //If proudct of two elements > 2 times sum. return true

          }

      }

  }

  return "false"; // If proudct of two elements < 2 times sum. return false

}  

int main()

{  

  printf("\nEnter size of array: ");

  scanf("%d", &n); //read size of array

  int A[n]; //array of size n

  printf("\nEnter array elements: ");

  int i;

  for(i = 0; i < n; i++)

  {

      scanf("%d", &A[i]); //read array from stdin

  }

  printf("%s\n",ArrayChallenge(A)); //ccall function and print answer

 

  return 0;

}

6 0
3 years ago
Other questions:
  • What has prompted schools to add Internet activities in their academic integrity policies?
    11·2 answers
  • Write a function named delete Letter that has 2 parameters. The first parameter is a string, the second parameter is an integer.
    11·1 answer
  • is this website just for a bunch of lazy kids bumming off answers? Because if that were the case I'd be one of them.
    9·1 answer
  • Is a fundamental building block of a relational database because this object stores all of the data
    15·1 answer
  • Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the info
    7·1 answer
  • this bar is located at the top of your computer school in.Its functions allow you to navigate the web​
    5·2 answers
  • 3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
    13·1 answer
  • 8.2 Code Practice Edhesive
    6·1 answer
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!