1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
8

When using the protection options in Excel 2016, what does the Protect Workbook function do?

Computers and Technology
2 answers:
solmaris [256]3 years ago
5 0

Answer:

it saves the workbook in a way that will allow only a select group of people to access it

sashaice [31]3 years ago
4 0

Answer:

It prevents worksheets from being inserted, deleted, or moved.

Explanation:

This is correct

You might be interested in
Word's Help feature is useful if you need to quickly learn how to print a document
KATRIN_1 [288]
If your on a website Ctrl+P and than chose your printer and print. or if downloaded it open it and find the print on the top left
7 0
4 years ago
You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are
lions [1.4K]

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

4 0
3 years ago
Which qualifications are typical for someone working in Marketing Information Management and Research?
Harman [31]

Answer:

• good teamwork skills and knowledge of search engines and social media.

• math skills for calculating prices, good teamwork, and physical stamina.

• a pleasant attitude, critical-thinking skills for designing surveys, and social awareness.

• creativity, persuasiveness, and good social skills when dealing with news media contacts.

Explanation:

Marketing Information Management and Research is a system in an organization whereby skills such as Marketing Information and Research are made use of by marketers to ensure that they come to know who their consumers are , what exactly the consumers want and how they can satisfy the needs and wants of the consumers using a very fast , precise and correct methods.

A person who works in Marketing Information Management and Research must have the following skills:

• good teamwork skills and knowledge of search engines and social media : Accurate knowledge of search engines such as google e.t.c. helps a person working in Marketing Information Management and Research to have access to the latest trends that consumers follow. These trends provides adequate information about the needs of consumers that is required in research.

Good teamwork skills is very important as it makes working in Marketing Information Management and Research very orderly, there is absence of chaos, when working with one another, creative ideas are obtained.

• math skills for calculating prices, good teamwork, and physical stamina : These skills above are very essential because such a person need to have adequate knowledge of the prices of goods and services that they produce. Physical stamina is also and essential skill.

• a pleasant attitude, critical-thinking skills for designing surveys, and social awareness : These qualifications are important because critical thinking helps a such a person to be able to come up with or create a solution using information from the surveys to accurately meet the needs of the consumers.

Having skills in social awareness gives the person working in Marketing Information Management and Research up to date information about what a consumer wants at this particular time or moment.

• creativity, persuasiveness, and good social skills when dealing with news media contacts: These skills are essential because consumers need to see creativity in products and services that they want as it makes them more attractive.

Having good social skills when dealing with news media contacts is also very important.

6 0
3 years ago
A cloud service provider uses the Internet to deliver a computing environment for developing, running, and managing software app
MakcuM [25]

The answer is PaaS (Platform as a Service)  

PaaS provides users with a cloud runtime environment in which they can develop, test, manage, and deliver applications. Users are able to use a suite of pre-built tools to develop and test their own apps. Thanks to these solutions, developers are able to deploy applications without the need of infrastructures such as servers, operating systems, or development tools.


6 0
3 years ago
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
Other questions:
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • If you want to access your files anywhere from almost any connected device, you should store your files on your ________.
    9·1 answer
  • The jaws of ________ chucks are advanced and retracted independently of each other and allow for fine-tuning the position of the
    6·1 answer
  • Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hi
    7·1 answer
  • Which router feature, when enabled, helps computers on the local network automatically discover and communicate with services pr
    12·1 answer
  • What is not true about field properties in Access?
    13·1 answer
  • Which is the purpose of adding B-Roll footage to a sequence?
    10·1 answer
  • Which is the correct expansion of the term Internet?
    14·2 answers
  • What is professional education? <br><br><br><br><br>Please help me to do this.​
    7·2 answers
  • What kind of charger can i use for this
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!