You use the ________ to find personal data stored in the workbook or personal document properties
A) Privacy Inspector B) Document Inspector
C) Privacy Checker D) Document Checker
B
Computer Science & Information Technology
You might also like to view...
A __________ loop will always be executed at least once.
a. pretest b. posttest c. conditional d. user-controlled
Computer Science & Information Technology
What can go wrong if every user of a Linux system has unlimited access to resources?
What will be an ideal response?
Computer Science & Information Technology
Buying and selling products or services on the Internet is ________
A) e-SMM B) e-purchasing C) e-commerce D) e-spending
Computer Science & Information Technology
The ____ used in the pseudocode reflects the logic you can see laid out graphically in the flowchart.
A. shape B. indentation C. font D. color
Computer Science & Information Technology