× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
5
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
New Topic  
srbarrett98 srbarrett98
wrote...
6 years ago
If Track Changes, or a similar tool, has been used while editing a document, it is important to keep the editing history before sending it to opposing counsel.
 
  a. True
   b. False
  Indicate whether the statement is true or false

Q. 2

The Protect Document option restricts how people may access the document, and protects the document from changes to the formatting or text.
 
  a. True
   b. False
  Indicate whether the statement is true or false

Q. 3

A file extension is a tag of three or four letters, preceded by a period, that identifies a data file's format or the application used to create the file.
 
  a. True
  b. False
  Indicate whether the statement is true or false

Q. 4

For many years, Jack Parsons used only conventional mail or couriers to send confidential documents to clients. He is wary of using email or the Internet for sending or sharing information, and is very concerned about the possibility that electronic communication may result in leaks of privileged or confidential documents. What precautions can Jack take to make sure that email and its attachments are kept secure?
 
  What will be an ideal response?

Q. 5

The table of authorities feature allows a user to create mass mailings by automatically combining a document, such as a form letter, with a list of recipients.
 
  a. True
   b. False
  Indicate whether the statement is true or false

Q. 6

Using MS Access, Kate Sandberg has accumulated a large database of client contacts while building her practice over the past 10 years. How can she use this data to market her practice? Describe at least two ways in which the information can be used.
 
  What will be an ideal response?
Read 29 times
1 Reply

Related Topics

Replies
wrote...
6 years ago
(Answer to #1)  FALSE

(Answer to #2)  TRUE

(Answer to #3)  TRUE

(Answer to #4)  Encryption programs use algorithms to scramble data that is sent over the Internet. Passwords and encryption keys can prevent unauthorized persons from reading the data. Encryption technology can also be used when sending files via email. A password is required by the recipient to de-scramble the file upon receipt.

(Answer to #5)  FALSE

(Answer to #6)  The database is integrated with Word, so that the database can be used to create a mail merge with form letters created in Word. The database entries may include information about the subject matter of the client's prior case. Whenever Kate learns of an important development in that subject area, she can use it as an opportunity to send information about that update to clients who have had matters in that area. This allows her to reconnect with these clients and demonstrate her continuing expertise. The database can also be used to send out holiday cards, birthday greetings, and other mailings.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1273 People Browsing
Related Images
  
 993
  
 1160
  
 871
Your Opinion
What's your favorite coffee beverage?
Votes: 274