Match the scenario with the Word 2010 feature:

I. discover hidden content in a file A. Document Inspector
II. discover file features that are supported by B. Compatibility Checker
Word 97-2003
III. check out the print preview C. Document Panel
IV. add a keyword D. AutoRecover
V. recover an unsaved file E. Backstage view


A, B, E, C, D

Computer Science & Information Technology

You might also like to view...

Which of the following is used to help define a baseline for normal activity on a firewall so that administrators will more likely notice any abnormal activity?

A) Firewall logs B) Proxy servers C) Bastion hosts D) Screened hosts

Computer Science & Information Technology

Generic in that it does not dictate specific formats, the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are two prerequisites for adding RDM disks to a VM(Choose two)

a. LUN used a RDM must be visible to the underlying hosts in cluster b. LUN used as a RDM cannot be visible to any other underlying host in the cluster c. VM resides on a VMFS datastore d. LUN used as a RDM must be hidden to the ESXi host

Computer Science & Information Technology

In the above figure, identify the symbolism tool used to produce the effect shown in the figure above the number 5.

What will be an ideal response?

Computer Science & Information Technology