You use the ________ to find personal data stored in the workbook or personal document properties

A) Privacy Inspector B) Document Inspector
C) Privacy Checker D) Document Checker


B

Computer Science & Information Technology

You might also like to view...

A __________ loop will always be executed at least once.

a. pretest b. posttest c. conditional d. user-controlled

Computer Science & Information Technology

What can go wrong if every user of a Linux system has unlimited access to resources?

What will be an ideal response?

Computer Science & Information Technology

Buying and selling products or services on the Internet is ________

A) e-SMM B) e-purchasing C) e-commerce D) e-spending

Computer Science & Information Technology

The ____ used in the pseudocode reflects the logic you can see laid out graphically in the flowchart.

A. shape B. indentation C. font D. color

Computer Science & Information Technology