1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
15

When you _____ a workbook, you control the ability users have to make changes to the file?

Computers and Technology
1 answer:
ehidna [41]3 years ago
5 0
<span>When you protect a workbook, you control the ability users have, to make changes to the file.  This is t</span><span>o prevent other users from making changes, functions like adding, moving, deleting, or hiding worksheets, and renaming worksheets, you can </span>protect<span> it </span><span>with a password. </span>
You might be interested in
Explain in brief terms some of the technology and developments that were important in the history and development of the Interne
igomit [66]

Answer: The Internet started in the 1960s as a way for government researchers to share information. ... This eventually led to the formation of the ARPANET (Advanced Research Projects Agency Network), the network that ultimately evolved into what we now know as the Internet.

Have a nice day ahead :)

7 0
3 years ago
If a node has a wireless connection to the internet, does that node have to be mobile
Marizza181 [45]
No it does not . answers
8 0
3 years ago
How can you quickly locate emails with large attachments.
IgorC [24]

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

<h3>How do I find emails by attachment size?</h3>

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

brainly.com/question/978078

4 0
2 years ago
Question 5 (2 points)
Scrat [10]

Answer:

B) 5 m/s

Explanation:

Took the test and this was the correct answer :)

6 0
3 years ago
A. True
Anuta_ua [19.1K]
100% TRUE AND VERY IMPORTANT
In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

From my experience, limit the number of those with full access (1-2 people, 3 at most).
Also, perform daily backups. If this data is critical, you can set timers for it to be backed up during intervals in the day.
Relationship databases or databases that can be shared should only be shared for viewing.
5 0
4 years ago
Other questions:
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • Which protocol do e-mail programs use to identify the file types of attached files?
    7·1 answer
  • Create a function named first_a that uses a list comprehension. The function will take a single integer parameter n. Find every
    13·1 answer
  • You are required to write a calculator for Geometric shapes(Circle, Square, and Rectangle). The basic idea is that you willprovi
    7·1 answer
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they
    5·2 answers
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP
    10·2 answers
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!