1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
12

There is a feature that allows you to lock the document, to avoid others making changes. True or False

Computers and Technology
1 answer:
garri49 [273]3 years ago
4 0

Answer:

True

Explanation:

On teams and on word

You might be interested in
What are the advantages and disadvantages of it?
Sholpan [36]
What is the question?
3 0
3 years ago
How did the invention of the printing press affect society?
MrMuchimi

Answer:

A. More people could influence the media of that time

Explanation:

Its immediate effect was that it spread information quickly and accurately. This helped create a wider literate reading public. However, its importance lay not just in how it spread information and opinions, but also in what sorts of information and opinions it was spreading.

8 0
2 years ago
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
What is the purpose of the Chart feature in Word?
Burka [1]

Answer:

i think its the second one

Explanation:

7 0
3 years ago
Read 2 more answers
Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is ide
ANEK [815]

Answer:

A

Explanation:

3 0
3 years ago
Other questions:
  • In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
    14·1 answer
  • Why were the spices in Asia so expensive when sold in Europe?
    11·2 answers
  • What does Josh Silverman name as the most important aspect of managing finances?
    10·2 answers
  • Select all that apply.
    8·1 answer
  • ¿dispositivos de hardware Que permite identificar la huella digital registrada por el usuario?
    11·1 answer
  • A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools
    12·2 answers
  • Speculate on how students 25 years from now will answer, "What computing innovation has had a significant impact on your life?"
    11·1 answer
  • Which statement gives an advantage of multicellular organisms?
    7·2 answers
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • The following SQL is which type of join? SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,OR
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!