1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
3 years ago
7

What does limited access to a document mean?

Computers and Technology
2 answers:
Licemer1 [7]3 years ago
7 0
The second last one is the answer i think
Dimas [21]3 years ago
7 0

Answer:

C). It enables a person to read the document but not edit it.

Explanation:

Limited access to a document is primarily associated with the creator of document restricting the usage and changes that can be made to a specific document. It assists the users to protect the authenticity of their document and prevent it from any unnecessary editing to the document. Therefore, the limited access to a document would imply 'enabling a person to only read the document but not edit or make changes to it' without the creator's permission. It is thus aimed to limit the access to a specific content. Therefore, <u>option C</u> is the correct answer.  

You might be interested in
An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
Flura [38]

Answer:

D. Operating system

Explanation:

A keyboard is a secondary item like a mouse and is not apart of computer hardware and app is also not a computer hardware because its coding not hardware. Web Browser is a Internet thing not hardware.

4 0
2 years ago
Read 2 more answers
Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
kupik [55]

Answer:

Windows Defender Using Security Updates and Antivirus Software for Clients

Explanation:

Windows Defender is a software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows. This program helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer.

7 0
3 years ago
Read 2 more answers
To begin importing data from an excel spreadsheet, click on the ____ tab on the ribbon.
Mamont248 [21]

Answer:

External data

Explanation:

The "external data" is one of the tabs on the ribbon. It is used for importing data from an excel spreadsheet.

Hope this helps!

3 0
3 years ago
Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
GrogVix [38]
<span>c. return a pointer to the first appearance of c appearing inside s and nullptr (0) if c does not appear inside s.</span>
7 0
3 years ago
If a Web page is not copyright protected, then it is ethical to cut and paste sections of the page into your speech without citi
JulijaS [17]

Answer:

False.

Explanation:

Even if the web page does not have copyright protection it is unethical to cut and paste sections of the page into your speech without citing the source.It is definitely plagiarism.You are copying content from other sources and representing the mas your own.So we conclude that the answer is false.

5 0
3 years ago
Other questions:
  • Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sendi
    14·1 answer
  • Computers with more than ____ of ram work with the aero interface in windows 7 as shown in the accompanying figure.
    15·1 answer
  • Web sites use _____ to track users while they are on the site.
    14·1 answer
  • a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style
    6·1 answer
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • This is 6th grade career class.
    10·1 answer
  • What is a common translator?​
    9·1 answer
  • Many of the first photographers were actually scientists and inventors. True or false?
    7·1 answer
  • Most of the energy we use originally came from:
    8·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!