1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
10

True or False / There is a feature that allows you to lock the document, to avoid others making changes.

Computers and Technology
1 answer:
Papessa [141]3 years ago
7 0

Answer:

true

Explanation:

You might be interested in
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
4 years ago
FREEFREEFREEFREEFREEFREE
Brrunno [24]

Answer:

niceeee :0

Explanation:

5 0
3 years ago
Read 2 more answers
Which computer are used by mobile employees such as meter readers.​
Naily [24]

Answer:

Handheld/Mobile Computers

3 0
3 years ago
Read 2 more answers
What do you mean by an algorithm?<br>​
Over [174]
A program that can be used in many scenarios
8 0
3 years ago
Under Juran's Law, whenever a problem occurs, what percentage of the time is the problem the result of a system/process error?
quester [9]

Answer:

C. 85 percent

Explanation:

Juran's Law is a law used in the category of Total Quality Management. This law states that whenever a problem occurs during a process, only about 15% of the time is it the individual's fault, the rest of the time it is the process's fault. Therefore 85% of the time, the problem is the result of a system/process error.

7 0
3 years ago
Other questions:
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • What is the printout of the call nPrint("a", 4)?
    14·1 answer
  • You find that you are missing a very important file. After much searching, you have determined that it is no longer on your comp
    13·2 answers
  • To execute a prepared SQL statement, you can use the ________________ and execute() methods of the PDOStatement object to set pa
    10·1 answer
  • What language must be used to display a bare-minimum webpage?
    8·2 answers
  • You are hired to train a group of new users to become technicians. One of your lessons is on how to construct Cat5 and Cat6 Ethe
    10·1 answer
  • "background" software that helps the computer manage its own internal resources is called ________.
    5·1 answer
  • Assume that you have an ArrayList variable named a containing 4 elements, and an object named element that is the correct type t
    9·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • What are the functions of super computer?<br> ​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!