1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
3

Selma needs to ensure that users who have access to her presentation are unable to make changes to the presentation.

Computers and Technology
1 answer:
sleet_krkn [62]3 years ago
6 0
Use protected view option
You might be interested in
What is an electronic medical record
Airida [17]
EGC . medical research science
3 0
3 years ago
What is returned by the code: range (20, 100, 30) ?
Hunter-Best [27]
Answer : (20, 50, 80)





4 0
3 years ago
WHO IS EXCITED FOR COLD WAR SEASON 1????
xxMikexx [17]

Answer:

me  iggggggg

Explanation:

7 0
3 years ago
Read 2 more answers
You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
Reil [10]

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

8 0
3 years ago
When you adopt a certain framework or strategy for solving a series of problems, you may fail to see other, more efficient ways
Olegator [25]
I believe it is called closed mindset. Closed mindset is when you fail to see other ways to your error and don't accept help or think you can improve.
7 0
3 years ago
Other questions:
  • Which of the following economic systems leaves production decisions completely up to the producers?
    15·2 answers
  • After a suspected identity fraud case has been resolved, you should:
    5·1 answer
  • If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho
    15·2 answers
  • (You don’t have to answer it’s just for you for points. Here is you’re riddle)
    9·2 answers
  • etwork behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in clo
    10·1 answer
  • Your sister is starting 9th grade next year and is thinking about going to college. What step would you recommend she take first
    7·2 answers
  • Hewo everyone look at me I look ugly don't I<br>​
    6·2 answers
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • Explain the main components of a computer system​
    12·1 answer
  • A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!