1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
4 years ago
10

How secure is a password protected word document?

Computers and Technology
1 answer:
tensa zangetsu [6.8K]4 years ago
8 0
Secure enough to keep someone out who get on your pc but you should encrypted it so no one o the pc or remotely access it with out a password or with out decrypting it
You might be interested in
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
Triangle O N M is cut by line segment L K. Line segment L K goes from side N O to side N M. The length of N L is x, the length o
Fantom [35]

Answer:

D) x=8

Explanation:

4 0
4 years ago
Read 2 more answers
What happens if you move unencrypted files into an encrypted folder?
mr_godi [17]
The new files become encrypted
6 0
3 years ago
Each character in a string has a(n) _______________ which specifies its position in the string.
-BARSIC- [3]
<span>The string is a sequence of characters.</span><span>
Each character in a string has an index which specifies its position in the string.
</span>The index of the first character is 0, the second character is 1, and so on.The character at the nth position has the index n.

5 0
3 years ago
During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
oksano4ka [1.4K]

Answer:

The correct answer is "Technical Feasibility".

Explanation:

System investigation is used to Review that whether the system is feasible or not for the proposal that they will design or creating.in the system investigation stage, we do the technical feasibility. The technical feasibility is used to check technical resources like hardware, software, etc in the organization.

The  Technical Feasibility in the System investigation  is used to solve the problem of business

6 0
3 years ago
Other questions:
  • What attributes a website indicates a more reliable source for information
    14·1 answer
  • We say that a sequence of numbers is a palindrome if it is read the same backward or forward. For example, the sequence: 6, 15,
    11·1 answer
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
    6·1 answer
  • The first thing you should select if you're using an Address Block or Greeting Line is
    11·1 answer
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
  • A program that will accept the ages of girls and boys and calculate the total and average age​
    15·1 answer
  • Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are t
    15·1 answer
  • You are supposed to do a report on something that interests you. You decided to do a report on dogs. As you research, you take n
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!